Military Intelligence Professional Bulletin - Federation of American ...
Military Intelligence Professional Bulletin - Federation of American ...
Military Intelligence Professional Bulletin - Federation of American ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
MIPB<br />
Operations in OEF<br />
April - June<br />
2009<br />
PB 34-O9-2<br />
Afghanistan
FROM THE EDITOR<br />
In this issue, three articles <strong>of</strong>fer perspectives on operations in Afghanistan. Captain Nenchek discusses<br />
the philosophy <strong>of</strong> the evolving insurgent “syndicates,” who are working together to resist the<br />
changes and ideas the Coalition Forces bring to Afghanistan. Captain Beall relates his experiences in<br />
employing Human <strong>Intelligence</strong> Collection Teams at the company level in both Iraq and Afghanistan.<br />
Lieutenant Colonel Lawson provides a look into the balancing act U.S. Army chaplains as non-combatants<br />
in Afghanistan are involved in with regards to Information Operations.<br />
Colonel Reyes discusses his experiences as the MNF-I C2 CIOC Chief, detailing the problems and<br />
solutions to streamlining the intelligence effort. First Lieutenant Winwood relates her experiences in<br />
integrating intelligence support into psychological operations.<br />
From a doctrinal standpoint, Lieutenant Colonels McDonough and Conway review the evolution <strong>of</strong><br />
priority intelligence requirements from a combined operations/intelligence view. Mr. Jack Kem discusses<br />
the constructs <strong>of</strong> assessment during operations–measures <strong>of</strong> effectiveness and measures <strong>of</strong> performance,<br />
common discussion threads in several articles in this issue.<br />
George Van Otten sheds light on a little known issue on our southern border, that <strong>of</strong> the illegal immigration<br />
and smuggling activities which use the Tohono O’odham Reservation as a corridor and <strong>of</strong>fers<br />
some solutions for combined agency involvement and training to stem the flow.<br />
Included in this issue is nomination information for the CSM Doug Russell Award as well as a biography<br />
<strong>of</strong> the 2009 winner.<br />
Our website is at https://icon.army.mil/<br />
If your unit or agency would like to receive MIPB at no cost, please email mipb@conus.army.mil and<br />
include a physical address and quantity desired or call the Editor at 520.5358.0956/DSN 879.0956.<br />
We are no longer accepting personal subscriptions. We mail to APOs. Please send any address corrections/changes<br />
to the above email address.<br />
Sterilla A. Smith<br />
Editor
MILITARY INTELLIGENCE<br />
PB 34-09-2 Volume 35 Number 2<br />
FEATURES<br />
April - June 2009<br />
Commanding General<br />
Major General John M. Custer III<br />
Deputy to the Commanding General<br />
Mr. Jerry V. Proctor<br />
Deputy Commanding General<br />
(Reserve Component)<br />
Brigadier General Joesph M. Wells<br />
Deputy Commander for Training<br />
Colonel Dennis A. Perkins<br />
Director, Directorate <strong>of</strong> Doctrine<br />
Colonel Michael J. Arinello<br />
Chief, ISR Operations Analysis<br />
Division<br />
Mr. Chet Brown<br />
MIPB Staff:<br />
Editor<br />
Sterilla A. Smith<br />
Design Director<br />
Patrick N. Franklin<br />
Design and Layout<br />
Patrick N. Franklin<br />
Lawrence Boyd<br />
Cover Design<br />
Lawrence Boyd<br />
Inside Back Cover<br />
Lawrence Boyd<br />
Issue Photographs<br />
Courtesy <strong>of</strong> the U.S. Army<br />
Purpose: The U.S. Army <strong>Intelligence</strong><br />
Center and Fort Huachuca (USAIC&FH)<br />
publishes the <strong>Military</strong> <strong>Intelligence</strong><br />
<strong>Pr<strong>of</strong>essional</strong> <strong>Bulletin</strong> (MIPB) quarterly<br />
under the provisions <strong>of</strong> AR 25-30. MIPB<br />
presents information designed to keep intelligence<br />
pr<strong>of</strong>essionals informed <strong>of</strong> current<br />
and emerging developments within<br />
the field and provides an open forum<br />
in which ideas; concepts; tactics, techniques,<br />
and procedures; historical perspectives;<br />
problems and solutions, etc.,<br />
can be exchanged and discussed for purposes<br />
<strong>of</strong> pr<strong>of</strong>essional development.<br />
Disclaimer: Views expressed are those<br />
<strong>of</strong> the authors and not those <strong>of</strong> the<br />
Department <strong>of</strong> Defense or its elements.<br />
The contents do not necessarily reflect<br />
<strong>of</strong>ficial U.S. Army positions and do not<br />
change or supersede information in any<br />
other U.S. Army publications.<br />
6 Observations as the MNF-I C2 CIOC Chief<br />
by Colonel D.J. Reyes<br />
10 War <strong>of</strong> Ideas: A New Way to View the Afghan Insurgency<br />
by Captain Margaret J. Nencheck<br />
13 <strong>Intelligence</strong> Support to Psychological Operations: The Ongoing Challenge<br />
by First Lieutenant Katie Winwood<br />
16 Understanding Priority <strong>Intelligence</strong> Requirements<br />
by Lieutenant Colonel William G. McDonough and Lieutenant Colonel John A.<br />
Conway<br />
24 Doctrinal Tension: The Chaplain and Information Operations<br />
by Chaplain (Lieutenant Colonel) Kenneth Lawson<br />
32 The HUMINT Heresies: The Disposition <strong>of</strong> Human <strong>Intelligence</strong> Collection<br />
in Counterinsurgency<br />
by Captain David Beall<br />
38 Illegal Immigration and Smuggling on the Tohono O’odham Reservation<br />
<strong>of</strong> Arizona: Opportunities for Applied <strong>Intelligence</strong> Training<br />
by George A. Van Otten, PhD<br />
46 BCST: The Army’s Premiere Battle Command Systems Collective Task<br />
Trainer<br />
by Major Michael Spears<br />
48 Assessment: Measures <strong>of</strong> Performance and Measures <strong>of</strong> Effectiveness<br />
by Colonel Jack D. Kem, PhD, U.S. Army, Retired<br />
2 Always Out Front<br />
3 CSM Forum<br />
51 Training the Corps<br />
WIT—The Battlefield<br />
Commander’s Force Multiplier<br />
in the CIED Fight<br />
by Major Chris Britt<br />
Fort Huachuca Invests in the<br />
Technological and Educational<br />
Development <strong>of</strong> Civilians<br />
by Mr. Richard K. Ward<br />
Embedded Training: What MI<br />
Needs in the Future<br />
by Ramona McCaa`<br />
59 20th Annual Bataan Memorial<br />
Death March<br />
Photos by Sergeant Austin<br />
Thomas<br />
By order <strong>of</strong> the Secretary <strong>of</strong> the Army:<br />
Official:<br />
JOYCE E. MORROW<br />
Administrative Assistant to the<br />
Secretary <strong>of</strong> the Army<br />
0919801<br />
DEPARTMENTS<br />
60 Buffalo Soldier Dedication<br />
Story and photos by Garlan<br />
Martens<br />
61 The <strong>Military</strong> <strong>Intelligence</strong><br />
Corps 2009 Hall <strong>of</strong> Fame<br />
Inductees<br />
70 <strong>Pr<strong>of</strong>essional</strong> Reader<br />
72 <strong>Intelligence</strong> Philatelic<br />
Vignettes by Mark Sommer<br />
73 Contact and Article<br />
Submission Information<br />
74-75 CG’s Reading List<br />
76 Nomination Information for<br />
the 2010 CSM Doug Russell<br />
Award<br />
Inside Back Cover: Sergeant<br />
Julian M. Jones, 2009 Doug<br />
Russell Award Recipient<br />
GEORGE W. CASEY JR.<br />
General, United States Army<br />
Chief <strong>of</strong> Staff
AlwAys Out FrOnt<br />
Major General John M. Custer III<br />
Commanding General<br />
U.S. Army <strong>Intelligence</strong> Center and Fort Huachuca<br />
On June 14, 2009, the U.S. Army celebrated 234 years <strong>of</strong> answering the call to duty. Since its inception<br />
in 1775 our Army has continued to evolve by becoming ever more flexible, innovative and better prepared<br />
to tackle new challenges. These characteristics will become increasingly important for our Army and<br />
our branch as we re-focus on Afghanistan as part <strong>of</strong> our expanding involvement in Operation Enduring<br />
Freedom (OEF).<br />
Looking at our Army’s history, whether it originated within the Continental Army or the State Militias,<br />
overcoming multifaceted adversity to achieve victory is our hallmark. The intelligence successes we<br />
have achieved together in this current conflict have required intense dedication to our pr<strong>of</strong>ession, innumerable<br />
personal hardships, the unwavering support <strong>of</strong> our loved ones, and all too <strong>of</strong>ten, the ultimate<br />
sacrifice <strong>of</strong> our brothers and sisters with whom we served. The lessons we have learned over<br />
these many years in which we have been engaged in OEF have come at a great cost that we will continue<br />
to bear. However, the sweat and blood which we have shed to pay for these lessons has also<br />
made us more determined, more agile, more pr<strong>of</strong>icient, and more assured <strong>of</strong> victory.<br />
The challenges and sacrifices we have all endured are not unique to our time. We share these hardships<br />
with those who formed our Army at its inception. I recently read a book entitled Founding Father<br />
about General George Washington’s experiences as the Commander <strong>of</strong> the Continental Army during<br />
the Revolutionary War. An introspective man, a great leader, a great Soldier, before becoming a great<br />
president, he feared his task might be too great for his talents. Yet under his leadership the Army<br />
endured years <strong>of</strong> misery and setbacks. Think about the men who served under his command. Those<br />
Continental Soldiers always seemed to be one misfortune away from defeat. They faced frequent shortages<br />
<strong>of</strong> food, supplies, medicine, and ammunition. For five years, Washington and his men continually<br />
faced defeat, death and internal setbacks. It took every ounce <strong>of</strong> courage, determination, faith, and a<br />
belief in what they were fighting for was truly worth the sacrifices each Soldier bore. After six years<br />
<strong>of</strong> fighting, on October 19, 1781, the Continental Army achieved victory with the surrender <strong>of</strong> British<br />
General Cornwallis at Yorktown.<br />
That’s persistence. That’s staying power. That’s what this Army was born with and born <strong>of</strong>, and that’s<br />
what our Army possesses today. It is this spirit <strong>of</strong> courage and tenacity that lives within each <strong>of</strong> us within<br />
<strong>Military</strong> <strong>Intelligence</strong> (MI) working every day to find and bring to justice the radical extremists who killed<br />
more than 3,000 <strong>of</strong> our innocent men, women, and children on September 11, 2001 and continue to<br />
threaten our nation.<br />
Still, there’s another aspect <strong>of</strong> our Army that we should be equally proud and will be increasingly<br />
important as the nature <strong>of</strong> this conflict evolves, and that is the degree <strong>of</strong> compassion and understanding<br />
U.S. Soldiers bring to the fight. Our adversaries know that <strong>American</strong> Soldiers will protect, care,<br />
and treat with dignity those whom we defeat or capture. Civilians with whom we come in contact do<br />
not fear our presence, for they know we understand their plight, their sacrifices, and their desire to<br />
live in peace.<br />
You’ve had to serve not just as Soldiers, but as diplomats; not just as Warfighters, but as peacekeepers.<br />
And with every new challenge, you have demonstrated the ability to rise to the occasion.<br />
(Continued on page 4)<br />
2 <strong>Military</strong> <strong>Intelligence</strong>
CsM FOruM<br />
Command Sergeant Major Gerardus Wyk<strong>of</strong>f<br />
Command Sergeant Major<br />
U.S. Army <strong>Intelligence</strong> Center and Fort Huachuca<br />
Earlier this month we celebrated the Army’s 234 th birthday. On June 14, 1775, our country’s founding<br />
fathers established the Continental Army in preparation for revolution against the British. In that<br />
regard, the Army has been around longer than the U.S. itself.<br />
What began as a mostly untrained group <strong>of</strong> 15,000 farmers and craftsmen has grown to become one<br />
<strong>of</strong> the largest, most elite and technologically advanced fighting forces in the world. The Army’s mission<br />
today remains much the same as it was more than two centuries ago–to champion the cause <strong>of</strong> freedom<br />
on our shores and abroad.<br />
Throughout the history <strong>of</strong> the Army, the noncommissioned <strong>of</strong>ficer (NCO) has played a vital role in<br />
the overall readiness <strong>of</strong> the force. Since 1775, the Army has set its NCOs apart from other enlisted<br />
Soldiers by insignia <strong>of</strong> grade. With more than 200 years <strong>of</strong> service, the U.S. Army’s NCO Corps has<br />
distinguished itself as the world’s most accomplished group <strong>of</strong> military pr<strong>of</strong>essionals.<br />
Through wars and military operations in every corner <strong>of</strong> the globe, America’s soldiers have served<br />
our country with bravery and pride. Seventeen U.S. presidents and 2,403 Medal <strong>of</strong> Honor recipients<br />
have served in the Army. Of those Medal <strong>of</strong> Honor recipients, almost half were NCOs. Thousands more<br />
heroes have sacrificed their lives in the name <strong>of</strong> liberty and millions have dedicated their lives to the<br />
service <strong>of</strong> their country.<br />
Historical and daily accounts <strong>of</strong> life as an NCO are exemplified by acts <strong>of</strong> courage, dedication, and willingness<br />
to do whatever it takes to complete the mission. In recognition <strong>of</strong> our commitment Secretary <strong>of</strong> the<br />
Army, Pete Geren, announced last October during the annual Association <strong>of</strong> the U.S. Army Conference,<br />
that 2009 will be the “Year <strong>of</strong> the NCO.” He stated that “the Army will accelerate the NCO development <strong>of</strong><br />
strategic initiatives, develop new initiatives that enhance training, education, capability, and utilization <strong>of</strong><br />
the NCO Corps, showcase the NCO story to the Army and the <strong>American</strong> people, honor the sacrifices and<br />
celebrate the contributions <strong>of</strong> the NCO Corps, past and present.” In its 234 year history, this is only the<br />
second time the Army has used this theme “Year <strong>of</strong> the NCO.”<br />
In the winter <strong>of</strong> 1778, during Valley Forge, Inspector General Friedrich von Steuben wrote the Army’s<br />
first manual, “The Blue Book” and described the importance <strong>of</strong> choosing the right soldiers as NCOs. “The<br />
order and discipline <strong>of</strong> a regiment depends so much upon their behavior, that only those who show their<br />
merit and good conduct are entitled to it.” NCOs have been celebrated for decorated service in military<br />
events ranging from Valley Forge to Gettysburg, to charges on Omaha Beach and battles along the Ho<br />
Chi Minh Trail, to current conflicts in Afghanistan and Iraq. NCOs have led from the front by providing<br />
purpose, direction, and motivation. The NCO Corps has and will always be the backbone supporting the<br />
greatest fighting power in the world!<br />
On May 20 th , Army Chief <strong>of</strong> Staff, General George W. Casey Jr. stated, “Any <strong>of</strong>ficer out here will tell you<br />
. . . that they are the <strong>of</strong>ficer that they are today, because there was an NCO behind them every step <strong>of</strong> the<br />
way. To some extent, all <strong>of</strong> us stand on the shoulders <strong>of</strong> great NCOs.”<br />
Today’s NCO is an innovative, competent, and pr<strong>of</strong>essional enlisted leader grounded in heritage, values<br />
and tradition. I encourage all NCOs to embody the Warrior Ethos and live the Army Values. We must lead<br />
by example, train from experience, maintain and enforce standards, take care <strong>of</strong> Soldiers and adapt to a<br />
(Continued on page 5)<br />
April - June 2009 3
AlwAys Out FrOnt (Continued from page 2)<br />
We’ll be victorious in this War on Terrorism. Of that I am absolutely certain and confident. It’s not<br />
just because <strong>of</strong> our overwhelming firepower, pr<strong>of</strong>essionalism, dedication, and the sweat and blood the<br />
men and women <strong>of</strong> our armed forces bring to the fight. We have a secret weapon on our side–the unwavering<br />
belief, shared with the Continental Army, that ours is the true cause <strong>of</strong> liberty, equality, and<br />
human freedom. Through your efforts the forces <strong>of</strong> darkness will be defeated. The forces who would<br />
turn the clock back on civilization will fail and the forces <strong>of</strong> light will be victorious. We will not fail in<br />
this fight.<br />
For over 200 years, the Army has been at the forefront <strong>of</strong> defending the freedom that makes our country<br />
such a very special place; a place where men and women are judged not by race, religion, creed, or family<br />
heritage, but on their individual merit. America has always been that flame burning bright where anyone<br />
with a desire to serve can excel with drive and talent.<br />
Every MI Soldier and the civilians serving alongside them are helping to write a new chapter in our Army’s<br />
glorious history. I know you will make it a proud chapter. Heritage is a burden on occasion. At other times<br />
it’s a great joy. Sometimes ‘Army Strong’ seems an understatement to me in describing what you do. Our<br />
nation may never know each <strong>of</strong> the individual successes made by MI pr<strong>of</strong>essionals serving around the<br />
world, but they will never forget the sacrifices and commitment you brought to this fight. Because <strong>of</strong> you<br />
the Army will proudly celebrate many birthdays in the future.<br />
Always Out Front!<br />
MG John Custer, Commanding General, U.S. Army <strong>Intelligence</strong> Center and Fort Huachuca,<br />
and Fort Huachuca’s youngest Soldier, PFC Garrett Bouldin cut the cake during the Army<br />
Birthday celebration on 12 June at Brown Parade Field.<br />
4 <strong>Military</strong> <strong>Intelligence</strong>
CsM FOruM<br />
(Continued from page 3)<br />
changing world. We are an important and essential part <strong>of</strong> the Army. The NCO Corps provides invaluable<br />
service and sacrifice in the line <strong>of</strong> duty. We continually prove our dedication and our willingness to make<br />
great sacrifices on behalf <strong>of</strong> our Nation. This goes not just for the Army, but for all services. NCOs <strong>of</strong> all<br />
branches are accomplishing great feats everyday that deserves recognition by the <strong>American</strong> public.<br />
I have witnessed first hand other nations, allies, and even our enemies seek out the expertise <strong>of</strong> our<br />
highly skilled, expertly trained, and pr<strong>of</strong>icient NCOs. They are amazed with our organization, skill set, initiative,<br />
and pr<strong>of</strong>essionalism. Most importantly, they are impressed with the level <strong>of</strong> respect given to our<br />
NCO Corps.<br />
NCOs understand the mission at hand. They are mentors, leaders, true pr<strong>of</strong>essionals. Above all, they<br />
take care <strong>of</strong> our Soldiers, Sailors, Airmen and Marines and ensure their safety. Although our military<br />
continues to challenge its service members with a heightened OPTEMPO, back to back deployments,<br />
and <strong>of</strong>ten times missions which seem unattainable, I encourage you to strive to remain relevant! I want<br />
to remind you <strong>of</strong> what Secretary <strong>of</strong> the Army, Pete Geren has said, “At the front <strong>of</strong> every Army mission<br />
in the U.S. or overseas, you’ll find NCOs. They know their mission, they know their equipment, and<br />
most importantly, they know their Soldiers.”<br />
I would like to relate the story <strong>of</strong> two amazing NCOs who were part <strong>of</strong> an event that truly changed the<br />
world. Before the USS Cole bombing, before 9/11, there was Somalia. On October 3, 1993 the world<br />
saw pictures <strong>of</strong> a dead <strong>American</strong> Soldier being dragged through the streets <strong>of</strong> Mogadishu, Somalia.<br />
Although Soldiers in every conflict and war have seen that level <strong>of</strong> hate, this was the first time the<br />
<strong>American</strong> public and the world saw it.<br />
Master Sergeant Gary Gordon and Sergeant First Class Randy Shugart were part <strong>of</strong> an operation that<br />
many people don’t even know had a name. That name was Operation Gothic Serpent. At the second crash<br />
site, the two Delta Snipers were inserted by helicopter (at their own request) to defend a crashed helicopter<br />
from hundreds <strong>of</strong> advancing Somalis in the Battle <strong>of</strong> Mogadishu.<br />
Ultimately both snipers were killed and the pilot, Michael Durant was taken hostage. But the fight<br />
that these NCOs showed left the impression to the Somali Militia that whomever they were protecting<br />
must be important, and perhaps that is why he wasn’t killed. SFC Shughart and MSG Gordon were<br />
the first Soldiers to be awarded Medals <strong>of</strong> Honor posthumously since the Vietnam War.<br />
Not every NCO will be put in a position to sacrifice his or her life. But every NCO will be expected to<br />
lead; they will be expected to make decisions that impact lives and missions. They will be expected to<br />
successfully complete missions, and they will be expected to live with the decisions that they make.<br />
We are at a point today that even junior NCOs are expected to take the level <strong>of</strong> responsibility <strong>of</strong> a senior<br />
NCO ten years ago. That may seem a tall order but the NCO Corps has been and always will be<br />
the backbone supporting the greatest fighting power in the world.<br />
NCOs Lead from the Front!<br />
April - June 2009 5
Introduction<br />
by Colonel D.J. Reyes<br />
From June 2007 through June 2008, I deployed to<br />
Iraq and served as the Multi-National Force-Iraq<br />
(MNF-I) C2 Combined <strong>Intelligence</strong> and Operations<br />
Center (CIOC) Chief. Like so many <strong>Military</strong> <strong>Intelligence</strong><br />
(MI) Soldiers returning again to Iraq, I had mixed<br />
feelings regarding the actual threat environment,<br />
how it changed or evolved, how I was going to<br />
understand the complexities, and how I would leverage<br />
the intelligence battlefield operating system<br />
capabilities to help the warfighters in the<br />
find, fix, finish, exploit, assess, and disseminate<br />
targeting process.<br />
This article is based on my own personal experience<br />
and observations during my tour. It outlines<br />
how I attempted to make sense <strong>of</strong> and develop processes<br />
into the system, provides some challenges<br />
faced, and <strong>of</strong>fers some recommendations for consideration<br />
to future CIOC chiefs as our military<br />
continues to support this endeavor.<br />
Organizational Analysis and Solutions<br />
1. Know your environment, know the plan, know the<br />
players, and know your capabilities. Realizing that<br />
the environment was complex, fluid, and involved<br />
aspects <strong>of</strong> PMESII (political, military, economic, social,<br />
information, and infrastructure) covering the<br />
tactical to strategic spectrum, I reviewed the MNF-I<br />
Commanding General’s (CG’s) Joint Campaign Plan<br />
(JCP) to understand the CG’s intent and vision. As I<br />
integrated into the daily battle rhythm <strong>of</strong> intelligence<br />
analysis, production and dissemination, I learned<br />
to appreciate the MNF-I network <strong>of</strong> key players. The<br />
diagram is only intended to illustrate the organizations<br />
that I was personally involved with for information<br />
flow and operational support.<br />
What it does not adequately capture is the intricate<br />
cross-flow <strong>of</strong> information among and between<br />
all <strong>of</strong> these organizations and the CIOC. Although<br />
the CIOC had a formal request for information/<br />
intelligence (RFI) system, there were multiple<br />
means <strong>of</strong> information sharing that resulted in ongoing<br />
actions or RFIs that were difficult to track.<br />
Thus, there was no single and comprehensive entry<br />
point into the CIOC. Another point to note on<br />
the diagram is the CIOC composition. We were<br />
fortunate to have robust interagency cell support,<br />
specifically the Defense <strong>Intelligence</strong> Agency (DIA),<br />
the National Geospatial-<strong>Intelligence</strong> Agency and<br />
the National Security Agency as well as the U.S.<br />
State Department.<br />
Although we had a good relationship with the<br />
other governmental organizations, we did not have<br />
embedded analytical support in the CIOC. This<br />
would have been most helpful in synchronizing intelligence<br />
and operations.<br />
6 <strong>Military</strong> <strong>Intelligence</strong><br />
BFC<br />
TF17<br />
TF HYDRA<br />
IFC<br />
MND-N<br />
MND-B<br />
MND-C<br />
MND-SE<br />
CJSOTF-AP<br />
TF TROY<br />
COIC<br />
TF16<br />
OCF-I<br />
TF714<br />
EUCOM<br />
MNC-I<br />
C2<br />
CIFC-A JAC<br />
Molesworth<br />
JASG MNSTC-I<br />
CIOC Chief<br />
A&P CM&D C2X CSG NGA<br />
ITFC DOMEX JDEC<br />
SCID CLE<br />
“C2 CIOC Enterprise”<br />
TF134<br />
JDIC<br />
MNF-I<br />
• STRATOPS<br />
• FSEC<br />
• SPA<br />
• STRATEFF<br />
• SJA<br />
• CIG<br />
• IO<br />
-------------------USEMB<br />
• POL<br />
DIA CENTCOM<br />
“Reachback”<br />
MNF-I C2 CIOC Chief<br />
MNF-I C2 CIOC Chief <strong>Intelligence</strong> and Information Flow<br />
<strong>Intelligence</strong> and Information Flow
Analytically, the CIOC provided a very capable,<br />
in-theater, all source fusion capability. How we tailored<br />
our efforts and support is covered later in<br />
the article. One <strong>of</strong> our challenges was providing the<br />
depth and fidelity <strong>of</strong> intelligence analysis that our<br />
broad audience required including, but not limited<br />
to, the CG, MNF-I and the various staffs, and the<br />
Iraqi intelligence, law enforcement, and judicial<br />
systems.<br />
During this phase, we identified the CIOC’s major<br />
essential tasks, how we were configured to accomplish<br />
those tasks, who was accomplishing those<br />
tasks, and how we mitigated loss <strong>of</strong> key personnel<br />
due to rotation and transition/train up time. We<br />
categorized the CIOC functions into analytical support,<br />
administrative support and overhead; thereby<br />
narrowing the field <strong>of</strong> available analysts. We further<br />
broke down the analysts into three sub-categories <strong>of</strong><br />
expert, journeyman, and novice. The major criteria<br />
that distinguished the expert from the journeyman<br />
categories were the actual subject matter expertise<br />
(SME) on the specific topic and amount <strong>of</strong> time<br />
spent on the specific topic (“dwell time” whether in<br />
theater or via reachback).<br />
At the end <strong>of</strong> the study it became apparent<br />
that we had three layers <strong>of</strong> analyst pr<strong>of</strong>iciency.<br />
DIA (Joint <strong>Intelligence</strong> Task Force-Combating<br />
Terrorism and the Iraq cell (IZ)) mainly comprised<br />
the experts, along with a handful <strong>of</strong> CENTCOM<br />
analysts. U.S. Central Command (CENTCOM) and<br />
a handful <strong>of</strong> Worldwide Individual Augmentation<br />
System (WIAS) analysts comprised the journeymen.<br />
The majority <strong>of</strong> the WIAS analysts fell into<br />
the novice category. In September 2007, we provided<br />
this analysis to the senior MI leadership<br />
(DIA, CENTCOM, U.S. Army <strong>Intelligence</strong> and<br />
Security Command (INSCOM)) at Fort Belvoir,<br />
Virginia. One <strong>of</strong> the issues we discussed was balancing<br />
the need to support the CG, MNF-I with<br />
robust forward based analytical expertise against<br />
developing the required bench strength in sanctuary<br />
(reachback) and sustaining the trained and<br />
current pool <strong>of</strong> analysts.<br />
2. CIOC Functional and Physical Re-alignment<br />
Analysis. Based on the previously mentioned<br />
study, we had to ensure that we maximized our<br />
capabilities to provide the most responsive, accurate<br />
and predictive intelligence to the warfighters.<br />
We realized that we had to “flatten the organiza-<br />
tion command and control (C2) wise and information<br />
flow wise.” We intuitively understood that the<br />
identified core <strong>of</strong> experts would carry the heavy analytical<br />
load and briefings/products and that we<br />
would place demands on the intelligence community<br />
(IC) reachback infrastructure in the Beltway.<br />
We knew that the journeymen and novices would<br />
have to overcome a steep learning curve and still<br />
provide value added in support <strong>of</strong> the rapidly moving<br />
intelligence cycle.<br />
Additionally, we looked at whether CIOC physical<br />
realignment (identify sections that collaborated<br />
on the most common issues, and physically<br />
redesign the CIOC floor to better facilitate this<br />
flow <strong>of</strong> information and intelligence sharing) was<br />
feasible, made sense, and would outweigh any<br />
costs to interrupting OPTEMPO and timely intelligence<br />
support. Our methodology was to review<br />
the CIOC battle rhythm, given a snapshot<br />
in time. We captured a 45 day period, noted the<br />
daily CG MNF-I battle update assessment (BUA)<br />
notes, identified key comments and taskers to<br />
the C2, and grouped these into major issues. We<br />
then used Visio and Analyst Notebook programs<br />
to graphically associate these issues with the respective<br />
CIOC Analysis & Production (A&P) functional<br />
area sections (i.e., Sunni, Shi’a, national<br />
issues, etc.) On paper, we redesigned the CIOC<br />
main floor to physically position those sections<br />
that shared common issues.<br />
We discovered that, in many instances, more<br />
than one analytical section was in fact working on<br />
the same CG issue. Additionally, with some exceptions,<br />
the current physical layout <strong>of</strong> analysts on<br />
the main floor did not lend well to “c<strong>of</strong>fee breath<br />
close” analyst interaction across the various sections.<br />
However, the sheer logistical and information<br />
technology efforts required to relocate entire<br />
analytical sections would adversely impact continuous<br />
intelligence support to operations. So, for<br />
this phase, we ended up moving less than a handful<br />
<strong>of</strong> analysts to help synergize analytical efforts<br />
and information flow between the sections.<br />
3. Additional re-look based on “Knowledge Centers”<br />
concept. Not quite satisfied with the current structure,<br />
we continued our organizational re-look. We<br />
still had to flatten the organization for better responsiveness.<br />
To maximize success, we realized<br />
that we needed to align our efforts with the opera-<br />
April - June 2009 7
tional structure found in the MNF-I STRATOPS.<br />
Its structure revolved around operational planning<br />
teams that directly supported the JCP lines<br />
<strong>of</strong> operation (LOOs). Using CJCSM 3500.04D, 01<br />
August 2005, Joint Mission Essential Task List as<br />
our guide, and specifically Strategic-Theater (ST)<br />
Objective 2 “Conduct Theater Strategic <strong>Intelligence</strong>,<br />
Surveillance, and Reconnaissance”, 2.1 through<br />
2.26, we identified 38 CIOC tasks, in accordance<br />
with Annex G (<strong>Intelligence</strong>) JCP OIF, v.1,<br />
27 November 2007. We then cross walked these<br />
tasks to the current analysts on hand, and formed<br />
five major groups, or Knowledge Centers. These<br />
included the following:<br />
Ê Government <strong>of</strong> Iraq C2 (covered Ministries and<br />
Governance.)<br />
Ê Regional neighbors (Iran, Syria, Jordan, Turkey,<br />
Saudi Arabia, Kuwait.)<br />
Ê Countering Iranian influence.<br />
Ê Countering maligned actors influence.<br />
Ê Foreign terrorists/fighters.<br />
This reorganization greatly assisted CIOC efforts<br />
in identifying the daily OPTEMPO product requirements<br />
in concert with STRATOPS, STRATEFF and<br />
the Force Strategic Engagement Cell (FSEC), establishing<br />
the “core” <strong>of</strong> required SMEs, journeymen,<br />
and novices to focus on the problem sets, and mitigating<br />
the loss <strong>of</strong> fully trained analysts due to tour<br />
rotations. This, in turn, helped CENTCOM and DIA<br />
better support the mission via their reachback and<br />
forward deployed assets.<br />
During my tour, the CIOC was able to “build<br />
the SME bench strength” up to 22 to 25 SMEs<br />
from CENTCOM and DIA. What was also significant<br />
was the in-theater senior analytical firepower<br />
at the Senior Executive Service (SES) level. Rich<br />
Baffa (A&P Senior <strong>Intelligence</strong> Officer (SIO)), Tom<br />
Greco (CIOC SIO), and Dan O’Brien (DIA Forward<br />
Element, Iraq) provided the C2 with real time, forward<br />
based, executive level analysis, as well as<br />
critical reachback connectivity and support from<br />
the national IC. This proved to be the added edge<br />
we required to “think and analyze at the graduate<br />
level.”<br />
Lessons Learned<br />
Ê<br />
Flattening the organization for responsiveness is<br />
a good thing. However, we occasionally experienced<br />
the challenges <strong>of</strong> quality control and du-<br />
plication <strong>of</strong> effort due to the fact that some “in<br />
the chain” were unaware <strong>of</strong> ongoing actions or<br />
its status. Analysts at all levels must ensure,<br />
and leaders must demand, that information is<br />
passed to those who need to know.<br />
Products/deliverables tended to be living documents<br />
with constant updating due to the fast<br />
moving OPTEMPO and requirements. Although<br />
we strive for the 100 percent solution, perfection<br />
is <strong>of</strong>ten times the enemy <strong>of</strong> good enough given<br />
the environment and demands.<br />
Foreign Disclosure Officer (FDO)/Translator review<br />
was a huge issue and <strong>of</strong>ten times a staffing<br />
impediment. Forward based elements required<br />
robust FDO and translator capabilities that required<br />
quick turn approval from the stateside<br />
originating agencies. We encountered many situations<br />
where the FDO approval process was<br />
not responsive to the CG requirements directing<br />
the CIOC to brief and provide “releasable IZ<br />
and non-releasable IZ” level products on short<br />
notice that would help shape the conditions for<br />
furthering the CG’s JCP or other missions.<br />
Ensure that the right analysts are deployed to<br />
meet the requirements. We studied the TF 714<br />
rotation model that trained, deployed forward,<br />
then redeployed but maintained continued expertise<br />
by dwelling on the target from sanctuary.<br />
Both DIA and CENTCOM patterned their methodology<br />
on this process. The challenge, as stated<br />
earlier, was to ensure that the maximum time<br />
and numbers <strong>of</strong> analytical expert presence forward<br />
based occurred. Deployment times varied<br />
from as little as three months to a year. Our experience<br />
indicated that six months was the acceptable<br />
duration for expert level deployments,<br />
but we also realized the challenges associated<br />
with sustaining the analytical base in sanctuary.<br />
Finally, we were able to deliver at the four star<br />
level because the C2 had the SES team to help<br />
develop, shape and operationalize his vision.<br />
The same rigor in screening requirements for DIA<br />
and CENTCOM must be applied to contractor<br />
and WIAS analyst requirements. Although the<br />
requisite level <strong>of</strong> security clearance is a must,<br />
analytically qualified and experienced analysts<br />
are the standard.<br />
Establish tactics, techniques, and procedures<br />
on how to conduct business. This is another<br />
8 <strong>Military</strong> <strong>Intelligence</strong><br />
Ê<br />
Ê<br />
Ê<br />
Ê<br />
Ê
Ê<br />
Ê<br />
Ê<br />
Ê<br />
Ê<br />
time consuming task but it must be done to<br />
<strong>of</strong>fset the rapid personnel turnover and trainup<br />
time, and continuous OPTEMPO. Simple 3x5<br />
cards that outline, step by step, the required<br />
tasks to run the morning C2 preparatory session,<br />
CG roundtable briefings, develop daily<br />
BUA themes, etc., will get the team into a predictable<br />
battle rhythm, increase time efficiency,<br />
and reduce the stress associated with discovery<br />
learning.<br />
“No one wakes up in the morning wanting to<br />
fail.” Leaders at all levels must always positively<br />
coach, teach, and mentor their respective teams<br />
or sections. They must always believe, and make<br />
their troops believe, that regardless <strong>of</strong> the incredible<br />
tasks and impossible deadlines, they can<br />
and will accomplish the mission to standard.<br />
OPTEMPO required a formal C2 chief <strong>of</strong> staff to<br />
assist the C2 in orchestrating the various moving<br />
parts and missions in the Perfume Palace and<br />
downtown. I noted that the other MNF-I staffs<br />
had authorized chiefs <strong>of</strong> staff. To this end, I informally<br />
initiated weekly (Sunday) deconfliction<br />
meetings with the other O-6 staff heads to help<br />
synchronize efforts, share information, and focus<br />
intelligence support across the MNF-I staff.<br />
Next to the C2, the most important position in<br />
the C2 is the Deputy C2 (DC2). The DC2 needs<br />
to be operationally experienced, pr<strong>of</strong>icient in directing<br />
a staff, a leader, and a team builder and<br />
synchronizer. Anything less and the C2 risks<br />
fracture within his organization and mission<br />
failure.<br />
The MNF-I OPTEMPO <strong>of</strong>ten required coordination<br />
with the stateside IC during <strong>of</strong>f duty hours<br />
or weekends. This <strong>of</strong>ten created a synchronization<br />
challenge for our more senior analysts<br />
charged with the daily C2 0600 BUA updates<br />
and CG Sunday morning roundtable briefings.<br />
CENTCOM C2 noted this challenge and refocused<br />
his Tampa based IZ cell main effort and<br />
“local time” to Baghdad time. Although this understandably<br />
created a certain level <strong>of</strong> discomfort<br />
in CONUS, the CIOC analysts greatly appreciated<br />
the support to the main effort in Iraq.<br />
As stated earlier, not only does the CIOC provide<br />
timely, relevant and predictive strategic<br />
level intelligence to the CG, MNF-I and warfighters,<br />
but the intelligence helps shape the strate-<br />
gic battlespace for the MNF-I staff to prosecute<br />
the four LOOs (political, diplomatic, economic<br />
and security) in support <strong>of</strong> the JCP. Thus, intelligence<br />
must support the strategic information<br />
operations efforts (STRATEFF), operations<br />
(STRATOPS), engagements and reconciliation<br />
efforts with maligned individuals and groups<br />
(FSEC), and overall strategy, plans and policies<br />
as we evolve as an organization supporting the<br />
post Provincial Iraq Control (PIC) environment<br />
(Strategy Plans and Analysis).<br />
The physical separation from the MNF-I staff<br />
<strong>of</strong>ten created challenges involving priority <strong>of</strong><br />
support/work, information sharing, and coordinating<br />
efforts. However, we mitigated this shortfall<br />
by embedding intelligence <strong>of</strong>ficers across the<br />
MNF-I staff. The intent was to inject operationally<br />
savvy, and intelligence attuned <strong>of</strong>ficers who<br />
could leverage the CIOC’s capabilities, understand<br />
the staffing requirements and prioritize<br />
intelligence support, and ultimately help the operational<br />
staffers shape the battlefield conditions<br />
in order to successfully prosecute the JCP.<br />
The C2 was <strong>of</strong>ten tasked with supporting the<br />
detainee review board by providing compelling<br />
intelligence on various detainees, high value individuals,<br />
and maligned actors in order to justify<br />
their conviction in an Iraqi Court <strong>of</strong> Law. This<br />
proved to be difficult as intelligence analysis<br />
was not always translated into hard, evidentiary<br />
pro<strong>of</strong>. As we continue along the post-PIC timeline<br />
we can expect an increasing support role<br />
<strong>of</strong> this nature as MNF-I transitions more functions<br />
to the Government <strong>of</strong> Iraq. Continued collaborative<br />
efforts and formal education/sharing<br />
between the IC and the legal system will help<br />
mitigate some <strong>of</strong> these challenges.<br />
April - June 2009 9<br />
Ê<br />
Ê<br />
Colonel Reyes is currently serving in HQ, INSCOM as the<br />
G3, Director for Operations and Training, and will assume<br />
command <strong>of</strong> the 116 th MI Group (NSA Gordon) this summer.<br />
Prior to the CIOC deployment he commanded the Joint<br />
Analysis Center , Molesworth, UK. He has commanded and<br />
served in principal staff positions in MI, Infantry and Special<br />
Forces units, and also served in the J3, Joint Staff. Colonel<br />
Reyes previously deployed to OIF 1 as the G2, 101 st Airborne<br />
Division (AASLT).
Introduction<br />
For over seven years, <strong>American</strong> and international<br />
forces have been waging a bitter, forgotten war in<br />
Afghanistan. Recently, the Afghan conflict has risen<br />
in focus and prominence as the war in Iraq draws<br />
down and the international community realizes that<br />
the Taliban and global jihadists have not been defeated<br />
as easily or swiftly as was once thought. In<br />
order to defeat this resilient and adaptive foe, more<br />
than a “new strategy” must be applied to this problem<br />
set. The solution first requires a nuanced understanding<br />
<strong>of</strong> the nature <strong>of</strong> the Afghan insurgency and<br />
the myriad <strong>of</strong> factors influencing this situation.<br />
Mao has aptly compared guerrillas to fish, and the<br />
people to the water in which they swim. If the political<br />
temperature is right, the fish, however few in<br />
number, will thrive and proliferate. It is therefore the<br />
principal concern <strong>of</strong> all guerrilla leaders to get the<br />
water to the right temperature and to keep it there. 1<br />
Mao’s analogy <strong>of</strong> fish and the maintenance <strong>of</strong> political<br />
temperature is uniquely appropriate to the current<br />
evolution <strong>of</strong> the Afghan situation. Many insurgent<br />
groups and regional powerbrokers have a vested interest<br />
in the maintenance <strong>of</strong> a weak central government.<br />
Without the unifying presence in Kabul <strong>of</strong> a<br />
strong central government, enabled by a viable economy<br />
and represented regionally by effective Afghan<br />
National Security Forces, conditions will continue<br />
to be set for regional insurgents and transnational<br />
terrorists to proliferate. Afghan insurgents capitalize<br />
on the relative deprivation <strong>of</strong> the Afghan population.<br />
Discontent with the distribution <strong>of</strong> opportunity is a<br />
theme that insurgents have used to pull tribal youth<br />
away from the cultural tribal elders and toward sympathetic<br />
religious leaders. To understand the impact<br />
the Afghan insurgency has on this situation, a better<br />
understanding <strong>of</strong> the full-spectrum operational environment<br />
must be achieved.<br />
by Captain Margaret J. Nencheck<br />
The Insurgent Syndicate<br />
In his book, “Koran, Kalashnikov, and Laptop: The<br />
Neo-Taliban Insurgency in Afghanistan,” Antonio<br />
Giustozzi describes a crisis in Afghan rural society<br />
that has led to a “revolution <strong>of</strong> rising expectations.”<br />
He postulates that this situation cannot be resolved<br />
by the current counterinsurgency or development<br />
strategies for Afghanistan. In addition, the border<br />
issues and policy problems with Pakistan have exacerbated<br />
this problem. 2<br />
These factors have influenced the current operational<br />
environment in Afghanistan, which is dominated<br />
by an evolving insurgent syndicate strategy.<br />
It is a unique and adaptive force, comprised <strong>of</strong> competing<br />
insurgent elements which interact and cooperate<br />
in order to serve mutual tactical interests<br />
and contribute to their overall strategic objectives<br />
in Afghanistan and the greater area <strong>of</strong> interest. In<br />
Afghanistan, we have seen the emergence <strong>of</strong> two<br />
distinct insurgencies: a Kandahari-based Taliban in<br />
the south and a more complex, adaptive insurgency<br />
influenced, though not controlled, by Al Qaeda’s<br />
global jihad in the east.<br />
This insurgent syndicate operating within<br />
Afghanistan, the destabilizing influence <strong>of</strong> the<br />
Federally Administered Tribal Areas and the political<br />
situation inside Pakistan, as well as the<br />
level <strong>of</strong> support provided to various aspects <strong>of</strong> the<br />
Afghan insurgency by Al Qaeda have ensured that<br />
Mao’s “political temperature” within Afghanistan<br />
remains optimal for continued insurgent efforts.<br />
This situation has afforded the diverse enemy<br />
groups within the East to develop the emerging<br />
insurgent syndicate strategy. Based on necessity,<br />
these groups with otherwise divergent goals operate<br />
in harmony. Logistical disruption and setbacks<br />
caused by Coalition operations, as well as<br />
governance and development successes evident<br />
10 <strong>Military</strong> <strong>Intelligence</strong>
throughout Afghanistan, have given the insurgency<br />
reason to ally in order to retain local and<br />
regional relevance and to maximize the potential<br />
for tactical and operational results.<br />
Revolution vs. Resistance<br />
Small wars and counterinsurgency expert Bernard<br />
Fall studied the <strong>American</strong> and French experiences<br />
in Vietnam extensively. From his observations, he<br />
concluded that conflicts, and indeed, the conflicts<br />
<strong>of</strong> the “future,” would not be “sublimited warfare,”<br />
“insurgency,” or “counterinsurgency,” but:<br />
RW=G+P<br />
Or “revolutionary warfare (RW) equals guerrilla<br />
warfare (G) plus political action (P).” This formula<br />
for revolutionary warfare is the result <strong>of</strong> the application<br />
<strong>of</strong> guerrilla methods to the furtherance <strong>of</strong> an<br />
ideology or a political system. 3 This type <strong>of</strong> warfare<br />
is evident in Afghanistan; however, the endstate is<br />
not a revolution in the common understanding <strong>of</strong> the<br />
concept. Instead, it is more <strong>of</strong> a resistance to change<br />
and those ideas that run counter to their extremist<br />
ideology. The change being resisted is embodied in<br />
the Coalition’s efforts to bring democracy, freedom <strong>of</strong><br />
choice, and religious tolerance to Afghanistan. The<br />
global jihad <strong>of</strong> Al Qaeda is viewed as preferable to the<br />
more radical initiatives <strong>of</strong> the Coalition. All aspects <strong>of</strong><br />
the Afghan operational environment fall on the continuum<br />
between revolution and resistance. Pakistan<br />
falls along a similar continuum but is less impacted<br />
by Western revolutionary influences. The following<br />
graphic depicts this paradigm from the perspective<br />
<strong>of</strong> the Afghan populace:<br />
Scale <strong>of</strong> Revolutionary Warfare in Afghanistan<br />
Key:<br />
ISAF- International Security Assistance Force<br />
GIRoA – Government <strong>of</strong> the Islamic Republic <strong>of</strong> Afghanistan<br />
HiG – Hezb-e Islami Gulbuddin<br />
HiK – Hezb-E Islami Khalis<br />
TNSM – Tehrik Nefaz-e Shariat Mohammadi<br />
IMU – Islamic Movement <strong>of</strong> Uzbekistan<br />
LeT – Lashkar-e-Tayyiba<br />
TTiP – Tehrik Taliban-I Pakistan<br />
On one end <strong>of</strong> the scale <strong>of</strong> revolutionary warfare is<br />
“revolution.” This extreme is embodied by the U.S.<br />
and ISAF, which promote the concepts <strong>of</strong> democracy<br />
and universal rights–terms foreign and revolutionary<br />
to Afghanistan. On the other extreme <strong>of</strong> the<br />
continuum is Al Qaeda and its strategic goal to establish<br />
a pan-Islamic caliphate throughout the world<br />
by working with allied Islamic extremist groups to<br />
overthrow regimes it deems “non-Islamic”; to expel<br />
Westerners and non-Muslims from Muslim countries<br />
(particularly Saudi Arabia), and to attempt to carry<br />
out future attacks against the U.S. and its worldwide<br />
interests. Along this scale fall the different,<br />
though <strong>of</strong>ten cooperative, insurgent groups with<br />
varying degrees <strong>of</strong> separation between revolution<br />
and resistance.<br />
Lessons from Vietnam<br />
In 1968, Army Chief <strong>of</strong> Staff General H.K. Johnson<br />
briefed the new U.S.-Vietnamese strategy for<br />
Vietnam. It was aimed at destroying the revolutionary<br />
position using what was described as a “twopincers<br />
strategy”: a violence program and a rural<br />
construction program. 4 The violence program can<br />
be compared to a conventional Security line <strong>of</strong> operation<br />
focus; whereas the construction program is<br />
likened to the Governance and Development lines <strong>of</strong><br />
operation. At the time, the strategy was nearly all focused<br />
on the violence program, leaving only a small<br />
percentage <strong>of</strong> the overall effort to the rural construction<br />
program. It is evident that the <strong>American</strong> military<br />
approach to this conflict relied too heavily on<br />
an “umbrella theory,” which points to the allegedly<br />
April - June 2009 11
decisive role <strong>of</strong> the enemy’s conventional military<br />
forces and <strong>of</strong> pre-stocked bases. 5 Such an “umbrella<br />
theory” might be contrasted to Mao’s fish theory,<br />
according to which proper social conditions are decisive<br />
and, once these are achieved, make the enemy’s<br />
conventional military forces largely irrelevant. 6<br />
The strategy to counter the Afghan insurgency is<br />
falling into the same pattern as the umbrella theory,<br />
which is incapable <strong>of</strong> answering the revolution<br />
<strong>of</strong> rising expectations and allows the insurgency to<br />
keep the political temperature right to allow this<br />
conflict to survive.<br />
Conclusion<br />
While Afghan insurgents will always have a vested<br />
interest in a weak central government, it is critical<br />
to GIRoA and ISAF success to give the Afghan<br />
people capable governance enabled with stable and<br />
viable economic development. More than a renewed<br />
commitment, but increased resources along with<br />
a detailed and comprehensive plan for counterterrorism<br />
and counterinsurgency operations, must be<br />
levied in Afghanistan in order for Al Qaeda and the<br />
complex Afghan insurgency to be defeated.<br />
Endnotes<br />
1. FMFRP 12-18, Mao Tse-Tung on Guerilla Warfare, 1989, 8.<br />
2. Antonio Giustozzi, Koran, Kalashnikov, and Laptop: The Neo-<br />
Taliban Insurgency in Afghanistan (New York: Columbia University<br />
Press, 2008), 230, 232.<br />
3. Bernard Fall, “The Theory and Practice <strong>of</strong> Insurgency and<br />
Counterinsurgency,” Naval War College Review, Winter 1998, Vol. LI,<br />
No. 1, <strong>Military</strong> Module, 47 at http://www.carlisle.army.mil/ietcop/<br />
documents/NWCR%20-%20The%20Theory%20&%20Practice%20<br />
<strong>of</strong>%20Insurgency%20&%20COIN%20APR%2065.pdf.<br />
4. Jeffrey Race, War Comes to Long An: Revolutionary Conflict in a<br />
Vietnamese Province (University <strong>of</strong> California Press: Berkeley, 1973),<br />
224.<br />
5. Ibid., 226.<br />
6. Ibid., 227.<br />
Captain Nencheck is currently assigned as the Fusion Officerin-Charge<br />
in the CJ2 section for Combined Joint Task Force-<br />
101. She has been deployed in support <strong>of</strong> Operation Enduring<br />
Freedom IX for over 13 months. She has also served as Brigade<br />
Collection Manager, Battalion S2, and Platoon leader and is<br />
a veteran <strong>of</strong> Operation Iraqi Freedom. Captain Nencheck is a<br />
2004 Distinguished Graduate <strong>of</strong> the U.S. <strong>Military</strong> Academy.<br />
12 <strong>Military</strong> <strong>Intelligence</strong>
Perception management, influencing operations,<br />
product dissemination, measures <strong>of</strong> effectiveness,<br />
propaganda, persuasion<br />
Introduction<br />
These are buzzwords heard every day in the<br />
9 th Psychological Operations (PSYOP) Battalion<br />
(Airborne) headquarters as commanders and staff<br />
plan and prepare to support tactical PSYOP missions<br />
worldwide. I served in this unit for nearly nine<br />
months as the Battalion S2 after graduating from<br />
the <strong>Military</strong> <strong>Intelligence</strong> (MI) Basic Course. It was<br />
not, however, until my move from Battalion S2 to<br />
Company <strong>Intelligence</strong> Officer that the above phrases<br />
came to mean anything to me.<br />
Tactical PSYOP companies are attached to other<br />
units; therefore, intelligence requirements are<br />
typically met by the supported unit, similar to the<br />
way administrative needs are met. Unfortunately<br />
for an eager lieutenant fresh out <strong>of</strong> the basic<br />
course, being a Battalion S2 in PSYOP meant<br />
passports, clearances, and security management.<br />
I served under leaders who recognized this issue<br />
and within a few months the unit was willing<br />
to forfeit a battalion staff <strong>of</strong>ficer to be the first<br />
ever Tactical PSYOP Company <strong>Intelligence</strong> Officer.<br />
During my time in this position, I served in the<br />
Combined Joint Special Operations Task Force-<br />
Arabian Peninsula (CJSOTF-AP), among the military’s<br />
finest. Serving among men and women <strong>of</strong><br />
this caliber in the Special Operations Forces (SOF)<br />
community was not only intimidating, it was inspiring.<br />
With this new found respect and title I<br />
earnestly set out on a quest to crack the code on<br />
intelligence support to PSYOP.<br />
The Threat<br />
The first step for any intelligence pr<strong>of</strong>essional is<br />
to gain atmospherics on the current threat and in<br />
my case PSYOP preparation <strong>of</strong> the operational environment<br />
(OE). This included understanding the<br />
idealism that drove militias and high value individuals<br />
(HVIs), but more specifically it meant seeing<br />
the conflict from the Iraqi people’s perspective. To<br />
understand their perspective the OE must be put<br />
in context <strong>of</strong> culture, education, religious affilia-<br />
by First Lieutenant Katie Winwood<br />
tion, economic stature, history and every other anthropological<br />
consideration. Ultimately I was trying<br />
to understand how Coalition Forces could change<br />
perceptions, and eventually behaviors. Since I was<br />
mostly alone in my quest among my analyst peers, I<br />
found a way to simultaneously support Psychological<br />
Operations and bring a PSYOP perspective to SOF<br />
intelligence.<br />
The Challenge<br />
The concept <strong>of</strong> perception management or influencing<br />
with words is not always embraced in the<br />
Armed Forces and certainly was not in an organization<br />
as kinetic-based as CJSOTF-AP. However, after<br />
five years <strong>of</strong> lethal operations military planners<br />
at every level were forced to re-evaluate the need<br />
for such force and ultimately place more emphasis<br />
on non-kinetic effects. This transition was due in<br />
part to the success <strong>of</strong> the surge, the Sunni awakening,<br />
and the ceasefire agreement with Muqtada<br />
Al-Sadr (leader <strong>of</strong> a major Shia militia). But mostly it<br />
was the realization that changing perceptions may<br />
just be the key to getting out <strong>of</strong> Iraq. Through these<br />
turns <strong>of</strong> events PSYOP, and consequently intelligence<br />
support to PSYOP, received a level <strong>of</strong> interest<br />
at CJSOTF-AP that was unlikely given to PSYOP<br />
planners during the earlier phases <strong>of</strong> the war.<br />
PSYOP leaders took advantage <strong>of</strong> this momentum<br />
by making perception management a consideration<br />
on every mission and intimately integrating themselves<br />
within the J3. Conspiracy theories run rampant<br />
among a populace as ill informed as Iraq’s and<br />
experience has taught us if we don’t tell the story<br />
someone else will.<br />
Often times a three man Tactical PSYOP Team<br />
(TPT) is the only voice <strong>of</strong> an entire Army. <strong>Intelligence</strong><br />
support to these operations is critical and leaves little<br />
room for error. There is a common saying in the<br />
4 th PSYOP Group (A) that “no PSYOP is better than<br />
bad PSYOP,” and the same is true for intelligence.<br />
The majority <strong>of</strong> my work came before operations began<br />
and after they completed. This included finding<br />
April - June 2009 13
and confirming facts on HVIs used for posters and<br />
handbills, compiling imagery for leaflet drops, and<br />
analyzing enemy propaganda to see how our products<br />
might be viewed in light <strong>of</strong> the competition.<br />
TPT Operations<br />
After operations concluded, I would sift through<br />
endless reports from any source available in the<br />
hopes <strong>of</strong> capturing some shred <strong>of</strong> evidence that<br />
could be used to specifically identify the populace’s<br />
response to the operation or measure <strong>of</strong> effectiveness<br />
(MOE.) My efforts were sometimes in vain due<br />
to the difficulty in connecting effects directly to nonkinetic<br />
operations. In fact, attempting to tie behavioral<br />
changes directly to PSYOP is the single greatest<br />
challenge <strong>of</strong> MOE; it is impossible to know if behavior<br />
changes are the result <strong>of</strong> PSYOP because it will<br />
never be feasible to eliminate all external factors. To<br />
further frustrate the matter the changes that can be<br />
measured take months or even years to surface and<br />
unfortunately there may not always be boots on the<br />
ground to capture them.<br />
The Information<br />
When I wasn’t monitoring behavioral changes and<br />
non-kinetic effects, I focused on meeting the immediate<br />
intelligence needs <strong>of</strong> the Company through<br />
requests for information (RFIs.) In this regard my<br />
mission was not much different from other intelligence<br />
pr<strong>of</strong>essionals; however the nature and content<br />
<strong>of</strong> these RFIs varied greatly and consequently I could<br />
not always rely on conventional unit’s products or<br />
my fellow SOF analysts. The PSYOP Soldiers on the<br />
ground were more interested in perceptions than any<br />
other factor so I <strong>of</strong>ten researched symbolism, animal<br />
and color associations, clothing attire, susceptibilities<br />
to products like medical aid vs. soccer balls,<br />
local graffiti, regional verbiage, even tribal history.<br />
On one occasion in particular, I reached back to 1st<br />
Information Operations (IO) Command to better understand<br />
the value put on horses in Arabic culture.<br />
This inquiry eventually led to a well received product<br />
used to mourn the loss <strong>of</strong> a loved tribal leader.<br />
This type <strong>of</strong> research and eventual knowledge<br />
gave me a chance to support PSYOP with relevant<br />
timely intelligence and bring a PSYOP perspective to<br />
CJSOTF-AP. This dual support ultimately meant job<br />
security for me. As the first intelligence <strong>of</strong>ficer to deploy<br />
with a tactical PSYOP company at CJSOTF-AP,<br />
it was imperative that I distinguished that role from<br />
traditional support and establish some level <strong>of</strong> credibility<br />
for intelligence specific to PSYOP. I was enthusiastic<br />
about this task because I came into the<br />
deployment feeling very strongly about providing intelligence<br />
tailored to the greatest information manipulator<br />
in the OE. I came out <strong>of</strong> my deployment<br />
equally enthusiastic about this task but more realistic<br />
in my expectation <strong>of</strong> meeting it.<br />
The Way Ahead<br />
Veterans <strong>of</strong> MI and IO recognize the deficit that exists<br />
with regard to intelligence support. The consensus<br />
for a solution seems to be education. Providing<br />
good intelligence analysis is simple–doctrine and<br />
training reinforced with experience. A good analyst<br />
should know intelligence s<strong>of</strong>tware, data mining, basic<br />
analyses, and stand ready to support any unit,<br />
in any capacity. One <strong>of</strong> the toughest challenges facing<br />
intelligence support to PSYOP is understanding<br />
PSYOP information needs. This problem will only<br />
be resolved with mutual efforts between PSYOP and<br />
<strong>Intelligence</strong> to better understand each other. Most<br />
PSYOP specialists will tell you the Army doesn’t un-<br />
14 <strong>Military</strong> <strong>Intelligence</strong>
derstand what they do, and after an eight month<br />
deployment with a Tactical PSYOP Company I can<br />
tell you this is mostly true. Like any major military<br />
change it takes time, especially for veteran Soldiers,<br />
to relook the way they see the fight. This transformation<br />
has made significant progress over the last<br />
five years as reflected in current stability, counterinsurgency<br />
and operational field manuals, but there<br />
is still much work to be done. The PSYOP and intelligence<br />
community must embark upon integration<br />
training that focuses on change, with a mutual respect<br />
for what each branch brings to the table. The<br />
success <strong>of</strong> PSYOP depends in part on its ability to<br />
integrate with the intelligence community and this<br />
integration depends primarily on good leaders who<br />
recognize the necessity and are diplomatic enough<br />
to integrate and move forward.<br />
Educating the Support<br />
<strong>Intelligence</strong> analysts at the lowest level <strong>of</strong> PSYOP<br />
units are a legitimate and necessary asset. PSYOP<br />
specialists are effects-based and really no different<br />
than maneuver in terms <strong>of</strong> their support needs.<br />
They do not have the time to read every situation report,<br />
track trends, gather imagery and conduct pattern<br />
analysis. At the very least, intelligence analysts<br />
free up PSYOP specialists to plan and operate. For<br />
far too long PSYOP specialists have been forced to do<br />
their own intelligence analyses in addition to the already<br />
demanding target audience analyses. There is<br />
much value added in cross training Soldiers but MI<br />
pr<strong>of</strong>essionals will not get better at analysis by conducting<br />
operations and operators will not get better<br />
at executing by doing analysis. <strong>Intelligence</strong> support<br />
to PSYOP is unique but it is still by definition a support<br />
element and for the sake <strong>of</strong> providing world<br />
class PSYOP should be trained on all facets <strong>of</strong> IO.<br />
The disconnect here is <strong>of</strong>ten in defining needs<br />
and requirements from top down. For example,<br />
when TPTs need special equipment they request it<br />
through their headquarters element, which in turn<br />
tasks supply. It is not up to the supply sergeant to<br />
anticipate a special need any more than it is up to an<br />
intelligence analyst to tell the commander what information<br />
needs his operators will have. Doctrinally<br />
speaking, intelligence drives maneuver and the commander<br />
drives intelligence. This type <strong>of</strong> guidance is<br />
traditionally generated through priority intelligence<br />
requirements and information requirements but it<br />
can be done in any capacity that defines and artic-<br />
ulates the commander’s objectives. Analysts need<br />
to be given areas <strong>of</strong> focus, especially when dealing<br />
with a theater <strong>of</strong> operation as complex as Iraq or<br />
Afghanistan. The real danger in not giving adequate<br />
guidance regarding information needs is unnecessarily<br />
risking lives <strong>of</strong> Soldiers in TPTs to disseminate<br />
ineffective or even inaccurate products.<br />
A Product Development Detachment packages products for a<br />
leaflet drop.<br />
The Code<br />
Essentially intelligence support to PSYOP provides<br />
the tools, in the form <strong>of</strong> information, necessary to understand<br />
and eventually influence behavior. Cracking<br />
the code on intelligence support to PSYOP cannot be<br />
done in one rotation but that is not to discredit the<br />
aggressive efforts that are underway to integrate, educate<br />
and ultimately improve the support. A crucial<br />
part <strong>of</strong> this solution is getting intelligence analysts integrated<br />
with the PSYOP process and the evidence <strong>of</strong><br />
this is the 4 th PSYOP Group’s ability to provide trained<br />
analysts with a broad, and when necessary, in-depth<br />
understanding <strong>of</strong> IO in terms <strong>of</strong> function, capability<br />
and application. The more each branch understands<br />
the intricate details <strong>of</strong> the other, the more likely they<br />
are to maintain successful longevity in meeting worldwide<br />
missions. Long term success for both elements<br />
is interdependent–support to PSYOP is not a success<br />
until PSYOP leaders wouldn’t conceive <strong>of</strong> going to the<br />
planning table without all resources available to them,<br />
and this includes intelligence assets.<br />
First Lieutenant Katie Winwood currently serves as the 9 th<br />
PSYOP Battalion (A) S2. She deployed with D/9 th PSYOP<br />
Battalion as the Company <strong>Intelligence</strong> Officer attached to<br />
the 5 th Special Forces Group in support <strong>of</strong> CJSOTF-AP, OIF<br />
IV. Lieutenant Winwood graduated from Liberty University<br />
with a BA in Government and was commissioned out <strong>of</strong> the<br />
University <strong>of</strong> Virginia in 2006.<br />
April - June 2009 15
y Lieutenant Colonel William G. McDonough and Lieutenant Colonel John A. Conway<br />
Introduction<br />
The most fundamental change within Army intelligence<br />
transformation is an effort to change the behavior<br />
and expectations <strong>of</strong> intelligence producers<br />
and consumers. The Army leadership views this as<br />
an essential step toward changing organizational<br />
and operational culture. <strong>Intelligence</strong> producers will<br />
transition from a current requirements orientation to<br />
an anticipatory approach while consumers shift their<br />
mindset from one <strong>of</strong> fighting with knowledge to one<br />
<strong>of</strong> fighting for knowledge. This new mindset views<br />
every soldier as a collector and as an analyst. 1<br />
The <strong>Military</strong> <strong>Intelligence</strong> (MI) Corps exists to provide<br />
commanders at all levels intelligence analysis<br />
to support decision making for planning and execution,<br />
assist in understanding the adversary, and<br />
define the operational environment. Since we will<br />
never have sufficient intelligence collection assets or<br />
analysts to produce all the intelligence a commander<br />
may want, priority intelligence requirements (PIRs)<br />
help focus collection and analytical production on<br />
select intelligence requirements. However, many <strong>of</strong><br />
today’s U.S. Army operational commanders 2 and<br />
key staff <strong>of</strong>ficers simply do not understand or are<br />
not aware <strong>of</strong> doctrinal changes and the increased<br />
extent <strong>of</strong> what PIRs are supposed to do for the commander.<br />
There are three primary reasons for this<br />
misunderstanding or lack <strong>of</strong> awareness.<br />
First, and most importantly, this misunderstanding<br />
is directly tied to our warfighting culture reflected<br />
through our operation’s doctrine since the<br />
mid-1970s. Doctrine, <strong>of</strong> course, provides a common<br />
frame <strong>of</strong> reference as a guide to action and is not a<br />
strict or inflexible set <strong>of</strong> rules. Army operations’ doctrine<br />
has shaped how we fight, plan, and interpret<br />
how all warfighting functions support operations.<br />
For the past three decades, this context shaped the<br />
culture, focus, and viewpoints that today’s senior<br />
field grade and general <strong>of</strong>ficers use to make deci-<br />
sions as well as establish processes to assist in their<br />
decision making.<br />
Second, Army Transformation has further complicated<br />
the issue. Prior to transformation, division and<br />
corps commanders could assist ground commanders<br />
primarily in the form <strong>of</strong> increased logistics, deep<br />
attack aviation or artillery, or more intelligence assets.<br />
Today, brigade commanders have capabilities<br />
once reserved for division commanders. Resultantly,<br />
brigade commanders have increased responsibility<br />
and capacity thus increasing the potential for decisions<br />
they have to make. Corps and division commanders<br />
have fewer or different decisions to make,<br />
especially in decentralized counterinsurgency (COIN)<br />
operations. Finally, while there are similarities in PIRs<br />
for conventional (<strong>of</strong>fensive and defensive) operations,<br />
there are differences for unconventional type conflicts<br />
(stability or civil support) such as COIN or Foreign<br />
Internal Defense.<br />
Operations and <strong>Intelligence</strong>–The<br />
Inseparable Link<br />
Before addressing PIRs, we must discuss the inseparable<br />
link between operations and intelligence.<br />
Specifically, we will highlight the evolution <strong>of</strong> Army<br />
operations’ doctrine since this is the driver <strong>of</strong> all<br />
other warfighting functions’ support. This doctrine<br />
shaped today’s senior leaders, our training centers<br />
and programs, and our planning and execution for<br />
operations. Since the 1970s, operations’ doctrine<br />
was predominantly tactically and <strong>of</strong>fensively focused<br />
against a Soviet threat. Competing with this<br />
doctrine was the reality <strong>of</strong> world conditions, most<br />
notably the threat and collapse <strong>of</strong> the Soviet Union,<br />
and emerging military, information, and intelligence<br />
capabilities and our ability to exploit them.<br />
After the Vietnam War, the Army rebuilt itself and<br />
largely forgot about its operations during Vietnam.<br />
While it rebuilt itself, the traditional Soviet threat<br />
in Europe regained its preeminence in our world<br />
16 <strong>Military</strong> <strong>Intelligence</strong>
view. Directly related to this was the realization<br />
during the 1973 Yom Kippur War that the conventional<br />
battlefield had become more lethal. As a result,<br />
the 1976 Field Manual (FM) 100-5 Operations<br />
envisioned an active defense in Europe against numerically<br />
superior Soviet military forces. This prescriptive<br />
and tactical manual focused on firepower<br />
more than maneuver and fixated on fighting and<br />
winning the first battle. 3<br />
In 1982, the Army released an updated version<br />
focused on the <strong>of</strong>fense. Known as Airland Battle,<br />
the manual focused on conventional <strong>of</strong>fensive operations<br />
to fight outnumbered and win. The main<br />
threat was still the Soviet Union in Europe. The<br />
manual introduced the four tenets <strong>of</strong> Airland Battle:<br />
initiative, agility, depth, and synchronization, as<br />
well as the operational level <strong>of</strong> war and the linking<br />
<strong>of</strong> the strategic to the tactical. 4 A legacy <strong>of</strong> the synchronization<br />
<strong>of</strong> operations and all other warfighting<br />
functions, while well intentioned and necessary,<br />
was an emphasis to synchronize finite assets over<br />
time and space for Airland Battle. This became increasingly<br />
more restrictive and, arguably, counterproductive<br />
in later years despite updated concepts<br />
<strong>of</strong> Army operations.<br />
The 1986 version <strong>of</strong> FM 100-5 moved beyond<br />
Europe and recognized unconventional, low intensity<br />
conflicts and light infantry divisions. It was also more<br />
general and theoretical which allowed flexibility for<br />
commanders. 5 However, it was still tied to the concept<br />
<strong>of</strong> Airland Battle, especially conventional <strong>of</strong>fensive<br />
operations and the desire for synchronization.<br />
In 1993, recognizing the world had changed after<br />
the Soviet Union’s collapse, the Army published<br />
a new FM 100-5. The manual was largely influenced<br />
by operations in Panama and Kuwait as well<br />
as emerging technologies. The manual emphasized<br />
depth and simultaneous attack in order to bring<br />
about a quick resolution. 6 Synchronization <strong>of</strong> the<br />
multiple lines <strong>of</strong> operations or effort was a critical<br />
component. The manual placed more emphasis on<br />
unconventional, low intensity conflicts and conflict<br />
termination; a conspicuous change from the 1976,<br />
1982, and 1986 manuals. However, the new FM<br />
lightly addressed these issues with the substance<br />
<strong>of</strong> those types <strong>of</strong> operations covered in other doctrinal<br />
publications. Conventional <strong>of</strong>fensive operations<br />
remained the Army’s doctrinal focus. The stunning<br />
application <strong>of</strong> this doctrine during Operation Desert<br />
Storm not only validated the Army’s conventional<br />
<strong>of</strong>fensive focus but solidified its primacy and focus<br />
throughout the Army.<br />
The 1998 version <strong>of</strong> FM 100-5 provided balance<br />
between <strong>of</strong>fensive and defensive operations, simultaneous<br />
and sequential operations, and emphasized<br />
joint operations. It also folded the concepts <strong>of</strong><br />
unconventional and conventional warfare into this<br />
manual. Prior to this manual, a generation <strong>of</strong> Army<br />
leaders grew up learning <strong>of</strong>fensive operations in a<br />
conventional warfare context. This type <strong>of</strong> warfare<br />
lends itself to decisions and decision points on a<br />
battlefield where battalion through corps level commanders<br />
have to make decisions such as when to<br />
commit a reserve, conduct a deep attack, shift the<br />
main effort, etc. along a linear battlefield.<br />
In 2001, the Army published FM 3-0 (previously<br />
numbered as 100-5) Operations. It clearly defined<br />
operations in a more holistic manner–<strong>of</strong>fense, defense,<br />
stability, and support operations. Despite<br />
this more encompassing approach, like the previous<br />
versions <strong>of</strong> FM 100-5, the Army focused on<br />
defensive operations just long enough to generate<br />
enough combat power to reinitiate <strong>of</strong>fensive operations.<br />
This permeated the construct <strong>of</strong> our National<br />
Training Center (NTC) and mission readiness exercises<br />
(MREs) in the 1980s and 1990s. It has<br />
taken the reality <strong>of</strong> the past seven years to finally<br />
acknowledge and provide equal weight to stability<br />
and support operations; operations that were marginalized<br />
as late as 2003 in our training centers<br />
and MREs.<br />
In February 2008, the Army produced the latest<br />
FM 3-0. The manual clearly acknowledges a holistic<br />
and complex operational environment; one that<br />
is multidimensional and increasingly fought among<br />
the population. This doctrine acknowledges an “operational<br />
concept where commanders employ <strong>of</strong>fensive,<br />
defensive, and stability or civil support<br />
operations simultaneously as part <strong>of</strong> an interdependent<br />
joint force to seize, retain, and exploit the<br />
initiative, accepting prudent risk to create opportunities<br />
to achieve decisive results.” 7<br />
Army operations doctrine has changed from a singular<br />
focus on conventional <strong>of</strong>fensive operations to<br />
a more holistic and inclusive recognition <strong>of</strong> <strong>of</strong>fensive,<br />
defensive, and stability operations. PIRs have<br />
also changed in recognition <strong>of</strong> today’s more complex<br />
environment.<br />
April - June 2009 17
Evolution <strong>of</strong> PIR<br />
Today’s senior Army leaders have spent the preponderance<br />
<strong>of</strong> their military careers serving in an<br />
army equipped, trained, led, and educated to defeat<br />
a nation-state peer-competitor….The <strong>of</strong>ficer<br />
pr<strong>of</strong>essional development career path designed to<br />
defeat this threat is a rigid path that has evolved<br />
into a “best answer” process….The Army teaches<br />
its leaders from day one that there are almost always<br />
proven sequences <strong>of</strong> events that, if followed,<br />
will lead to the desired outcome. Facing a templatable<br />
enemy like our Cold War adversaries, adherence<br />
to Army Doctrine became the glide path into<br />
“how to think” and “what to do”….this approach<br />
has resulted in the development <strong>of</strong> narrow, sometimes<br />
inflexible leadership qualities and decision<br />
making processes that are not necessarily suited<br />
for today’s contemporary operating environment.<br />
Army leaders have been quite successful…putting<br />
conventional warfighting and leadership skills into<br />
a “black or white” category. The challenge faced today<br />
and in the future is reassessing and reorganizing<br />
these skills to operate just as effectively and<br />
efficiently in the ever-growing “gray” world. 8<br />
For three decades, the Army focused on conventional,<br />
<strong>of</strong>fensive operations while ignoring or shortchanging<br />
other operations. This is not a critique <strong>of</strong><br />
that focus given the strategic problems facing our<br />
nation and the Army’s answer to meet that challenge.<br />
It is simply to highlight the cultural environment<br />
that today’s senior <strong>of</strong>ficers grew up in during<br />
their formative years coming up through the ranks.<br />
Before 1990, the Army had eleven mechanized,<br />
one airborne, one air assault, one motorized, and<br />
four light active duty divisions. After the drawdown<br />
in the 1990s, the Army possessed six mechanized,<br />
one airborne, one air assault, and two<br />
light active duty divisions. Mechanized units are<br />
ideal for fighting a peer competitor such as the<br />
Soviet Union. The preponderance <strong>of</strong> today’s senior<br />
<strong>of</strong>ficers were influenced in some fashion by conventional,<br />
<strong>of</strong>fense oriented training and doctrine.<br />
The Army’s training centers and exercise events<br />
reinforced our predilection to make decisions in<br />
order to take action.<br />
Since the opening <strong>of</strong> the NTC in 1981, most “<strong>of</strong><br />
America’s top Army generals carry with them the<br />
almost-war stories <strong>of</strong> their trips to Fort Irwin.” 9<br />
Until fairly recently, the NTC focused on conven-<br />
tional force-on-force exercises with little attention<br />
paid to other types <strong>of</strong> operations. Additionally, our<br />
training centers and MREs are designed to force<br />
battalion through corps level commanders and<br />
staffs to plan and make decisions in a very compressed<br />
time frame in order to meet multiple training<br />
objectives. This in turn reinforces our cultural<br />
tendency to want to “do something” or make a decision<br />
as opposed to demonstrating patience and<br />
realize that a decision or action may not have to<br />
be made.<br />
The training center exception is arguably the<br />
Joint Readiness Training Center. It was designed<br />
for light infantry, airborne, and special operations<br />
forces as a light infantry equivalent <strong>of</strong> the NTC. A<br />
typical pre-9/11 training scenario consisted <strong>of</strong> an insertion<br />
and counterinsurgency operation; a defense<br />
(in response to a fictitious enemy attack), and culminated<br />
with an attack into a <strong>Military</strong> Operations in<br />
Urban Terrain complex. However, units still planned<br />
and made decisions in a very compressed time frame<br />
in order to meet multiple training objectives.<br />
On a final note, division and corps commanders<br />
are typically infantry <strong>of</strong>ficers; they grew up in the<br />
Army inculcated in our <strong>of</strong>fensive, tactically focused<br />
doctrine. A majority <strong>of</strong> division and corps level staff<br />
<strong>of</strong>ficers typically have only served at the battalion<br />
or brigade level in staff and/or command positions<br />
prior to serving on a higher staff. Since we are all<br />
victims <strong>of</strong> our past experiences, we are comfortable<br />
using methods that have worked in the past in new<br />
positions. This becomes important when related to<br />
PIR development.<br />
The 1994 FM 34-2 Collection Management and<br />
Synchronization Planning collection management<br />
doctrine is nested in the conventionally focused operations<br />
doctrine <strong>of</strong> the past. FM 34-2 recommended<br />
that intelligence <strong>of</strong>ficers and commanders should<br />
refine PIRs to specific questions that are linked<br />
to operational decisions. 10 Additionally, Collection<br />
Managers usually developed specific information<br />
requirements for both PIRs and intelligence requirements<br />
(IRs) to “complete the collection strategy by<br />
associating each requirement and its corresponding<br />
decision points and timelines.” 11 This inference<br />
linked PIRs, already linked to decisions, to arguably<br />
more constricted decision points.<br />
However, in 2004, the definition <strong>of</strong> PIRs became<br />
less constrained. FM 2-0 <strong>Intelligence</strong>, expanded the<br />
18 <strong>Military</strong> <strong>Intelligence</strong>
definition <strong>of</strong> PIRs by stating that answers “to the<br />
PIRs help produce intelligence essential to the commander’s<br />
situational understanding and decisionmaking<br />
[emphasis added].” 12<br />
The new February 2008 FM 3-0 further loosened<br />
the confines <strong>of</strong> PIRs solely being tied to <strong>of</strong>fensive<br />
focused decisions and decision points and related<br />
them to the more inclusive definition <strong>of</strong> operations<br />
(<strong>of</strong>fense, defense, and stability). PIRs, along with<br />
friendly force information requirements (FFIR),<br />
are part <strong>of</strong> what are known as commander’s critical<br />
information requirements (CCIRs). CCIRs are<br />
information requirements identified as critical to<br />
facilitate timely decisionmaking. CCIRs directly influence<br />
decisionmaking and facilitate the successful<br />
execution <strong>of</strong> military operations; they may support<br />
one or more decisions. 13 FM 3-0 states that a PIR<br />
“is an intelligence requirement, stated as a priority<br />
for intelligence support, that the commander and<br />
staff need to understand the adversary or the operational<br />
environment….PIRs identify the information<br />
about the enemy, terrain and weather, and civil<br />
considerations that the commander considers most<br />
important.” 14<br />
Finally, the just released 2008 FMI 2-01<br />
(the replacement for the 1994 FM 34-2), ISR<br />
Synchronization, states that a PIR is “an intelligence<br />
requirement, stated as a priority for intelligence<br />
support, which the commander and staff<br />
need to understand the adversary or the operational<br />
environment.” 15<br />
Transformation<br />
As described above, a generation <strong>of</strong> Army operations’<br />
doctrine created a culture and leadership<br />
mindset that emphasized conventional <strong>of</strong>fensive operations,<br />
decisions to conduct an <strong>of</strong>fensive fight, and<br />
synchronization <strong>of</strong> all available warfighting capability<br />
towards that focus. Additionally, until the Army’s<br />
ongoing transformation efforts, the Army has been<br />
a division centric organization since World War I.<br />
Pre-transformation divisions were the largest tactical<br />
units considered to be a combined arms team,<br />
self sustaining, and capable <strong>of</strong> independent operations.<br />
Transformation has changed this paradigm<br />
with brigades now the emphasis. This has exacerbated<br />
the friction between senior leaders working or<br />
commanding at the division or corps level, educated<br />
in the culture <strong>of</strong> the past 25 years with less or different<br />
ability to influence the battle space, and trans-<br />
formed brigades who enjoy significant autonomy,<br />
more combat power, increased situational awareness,<br />
and larger battle space.<br />
Transformation restructuring resulted in an Army<br />
that is now brigade combat team (BCT) centric.<br />
Simplistically, capabilities once assigned to a division<br />
are now organic in a BCT, providing them with<br />
means to accomplish more tasks. For example, the<br />
division formerly had a military intelligence (MI)<br />
battalion with division level assets. Under transformation,<br />
this MI battalion no longer exists; many <strong>of</strong><br />
its assets are now organic to a BCT while the rest<br />
are obsolete and no longer in the Army inventory. 16<br />
This reduced a division’s traditional ability to shape<br />
the battle space for a brigade commander with additional<br />
intelligence collection.<br />
Additionally, transformation has expanded the<br />
battle space for BCTs and increased the length<br />
<strong>of</strong> the lines <strong>of</strong> communications laterally between<br />
units and vertically between command and support<br />
echelons. 17 The end result are BCTs that are<br />
the Army’s primary tactical formations and more<br />
autonomous than before; a significant friction<br />
point between BCTs and higher level organizations<br />
commanded by leaders whose formative years were<br />
shaped by the Army’s division centric and conventional<br />
<strong>of</strong>fensive operations culture. BCT commanders<br />
are largely no longer dependent on the division<br />
to provide resources. Technology has expanded a<br />
BCT commander’s ability to see the battle space<br />
and affect it with organic assets. Today, intelligence<br />
is distributed and managed in nearly a flattened<br />
network where all echelons receive the dissemination<br />
<strong>of</strong> intelligence at nearly the same time and<br />
share the same databases <strong>of</strong> information. There is<br />
no real stove-pipe or special highly classified intelligence<br />
that is not shared with all echelons. BCTs<br />
are no longer dependent on a division for “seeing<br />
over the next ridge” and for early warning <strong>of</strong> enemy<br />
intentions and actions. This creates some cognitive<br />
dissonance for senior <strong>of</strong>ficers at the division<br />
and corps level since this new dynamic is not what<br />
they grew up with in the 1980s and 1990s. The<br />
type, scope, and timeliness <strong>of</strong> decisions that both<br />
BCT and higher level commanders have to make<br />
have changed.<br />
Priority <strong>Intelligence</strong> Requirements<br />
In 2003, to meet the needs <strong>of</strong> Army Transformation,<br />
the Army G2 created TF Actionable <strong>Intelligence</strong><br />
April - June 2009 19
to change the way that MI would operate in the<br />
future. 18 One <strong>of</strong> the four Task Force Actionable<br />
<strong>Intelligence</strong> concepts was to change the culture<br />
and mindset <strong>of</strong> intelligence producers and consumers.<br />
19 To achieve this goal, the task force<br />
envisioned organizational, procedural, and technological<br />
changes to affect our culture in order<br />
to facilitate intelligence, information, and insights<br />
from all echelons. 20<br />
Part <strong>of</strong> this procedural change is to recognize that<br />
PIRs have changed as well as the types and timeliness<br />
<strong>of</strong> decisions that commanders have to make.<br />
PIRs help to provide commanders with an understanding<br />
<strong>of</strong> the operational environment which assists<br />
in planning and making decisions.<br />
PIR development involves not just anticipating<br />
what decisions a commander may have to make<br />
but also the relationships between friendly units;<br />
information systems; collection, processing, and<br />
dissemination systems; and the political, military,<br />
economic, social, infrastructure, information,<br />
physical environment, and time operational<br />
variables. Answers to PIRs (and FFIRs) help the<br />
commander visualize the operational environment.<br />
Crafting PIRs is important because every<br />
PIR costs time, resource allocation, and analytical<br />
effort.<br />
<strong>Intelligence</strong> <strong>of</strong>ficers validate and recommend<br />
PIRs. 21 Commanders approve IRs essential to mission<br />
accomplishment as PIRs, which form the basis<br />
for planning and executing operations. 22 Typically,<br />
PIRs are developed during MDMP and are reviewed<br />
and adjusted as conditions change, operations progress,<br />
or the PIR(s) are answered. Each set <strong>of</strong> PIRs<br />
is unique to the circumstances and context <strong>of</strong> the<br />
time. FM 5-0 and FMI 2-01 describe how PIRs are<br />
developed during MDMP. 23<br />
The following highlight the PIR guidelines [emphasis<br />
added] from 1994 to present.<br />
FM 34-2 (1994) 24 FM 34-8-2 (1998) 25<br />
They ask only one question. They ask only one question.<br />
They focus on a specific fact, event, or<br />
activity.<br />
They provide intelligence required to support<br />
a single decision.<br />
They focus on a specific fact, event, or<br />
activity.<br />
They provide intelligence required to support<br />
a single decision.<br />
PIR should be focused, specific, and directly They are tied to key decisions that the<br />
related to friendly decision expected to occur commander has to make.<br />
during COA execution.<br />
They give a latest time information is <strong>of</strong><br />
value (LTIOV).<br />
ST 2-50.4 (2001) 26 FMI 2-01 (2008) 27<br />
Do not give multiple questions in a single PIR Ask only one question.<br />
or you will not focus on your real requirement<br />
and may not satisfy your requirement.<br />
Base most <strong>of</strong> your PIR on a specific fact, They focus on a specific fact, event, or<br />
event, or activity that threat has or is known activity.<br />
to do (or specific to environment) but<br />
remember to consider how threat could<br />
suprise you (an atypical threat) - potentially<br />
one <strong>of</strong> their greatest advantages.<br />
PIR are listed and ranked in order from most They provide intelligence required to support<br />
to least important.<br />
a single planning task, decision, or action.<br />
Do not ask questions that have been<br />
They can be satisfied using available assets or<br />
answered.<br />
capabilities.<br />
The guidelines have changed little between 1994<br />
and the new FMI 2-01. However, there has been a<br />
subtle and nuanced expansion <strong>of</strong> PIRs supporting<br />
a single decision to supporting a single planning<br />
task, decision, or action. Another guideline is that<br />
FMI 2-01 states that PIR should be satisfied using<br />
available assets or capabilities. While this seems<br />
obvious, it usually inferred technical intelligence<br />
capabilities in the pre-Transformation Army. This<br />
is especially important for a division that no longer<br />
possesses any organic intelligence collection assets.<br />
A unit’s collection assets or capabilities are<br />
all its intelligence, surveillance, and reconnaissance<br />
(ISR) and non-ISR resources. All units and<br />
Soldiers are potential sources <strong>of</strong> relevant information<br />
to support the commander’s PIRs.<br />
PIRs today need to support those key IRs that<br />
a commander needs to achieve better overall situational<br />
understanding <strong>of</strong> his operational environment<br />
that he deems a priority for mission<br />
success. These priorities do not necessarily need<br />
to be linked directly to a commander’s decision;<br />
one PIR in fact may be linked to multiple decisions,<br />
actions, or future planning efforts. Also,<br />
PIRs must not be so restrictive that they force<br />
rigid and singular enemy/threat based collection<br />
requirements. Additionally, despite these guidelines,<br />
it is sometimes acceptable to ask more than<br />
one question. For example, if you want to know<br />
where an enemy force might attack, it is almost<br />
automatic to ask when they might attack. So, instead<br />
<strong>of</strong> writing two PIRs where the answers are<br />
interrelated, it should be acceptable to create a<br />
PIR such as “Where and when will Threat Group<br />
X attack U.S. forces in our operational environment?”<br />
Finally, PIRs can be solely about nonlethal<br />
aspects <strong>of</strong> the full spectrum <strong>of</strong> operations such<br />
as focusing on understanding the capacity <strong>of</strong> a<br />
community’s essential services it provides or the<br />
effectiveness <strong>of</strong> its local security forces and local<br />
governance.<br />
20 <strong>Military</strong> <strong>Intelligence</strong>
ISR assets include: infantry and armor scout platoons;<br />
cavalry units; battlefield surveillance brigades;<br />
all human intelligence; geospatial intelligence;<br />
signals intelligence; measurement and signature intelligence;<br />
counterintelligence assets; unmanned aerial<br />
system units; fires target acquisition sections;<br />
long-range surveillance units; chemical, biological,<br />
radiological, and nuclear squads; reconnaissance<br />
squadrons; and attack and/or reconnaissance aircraft.<br />
ISR capable units are units that do not have<br />
surveillance and/or reconnaissance as their primary<br />
mission but can be directed to perform ISR<br />
functions. The units include combat engineer battalions;<br />
engineer reconnaissance sections; infantry<br />
battalions; military police; and brigade combat<br />
teams. Other units that can collect and disseminate<br />
PIR information include unit leaders that meet with<br />
local leaders; civil affairs teams; and transportation<br />
or sustainment units.<br />
Since a unit’s collection assets or capabilities are<br />
all its ISR and non-ISR assets, the operations <strong>of</strong>ficer<br />
synchronizes intelligence collection throughout<br />
the organization. “The operations <strong>of</strong>ficer (in coordination<br />
with the intelligence <strong>of</strong>ficer and other staff<br />
members) tasks available ISR assets to best satisfy<br />
each requirement.” 28 PIRs are answered by multiple<br />
echelons <strong>of</strong> units and staff sections across a unit.<br />
The collection manager synchronizes intelligence<br />
collection assets and ensures, in conjunction with<br />
the operations <strong>of</strong>ficer, that other non intelligence<br />
collectors are worked into an overall synchronization<br />
plan.<br />
Irregular Warfare (COIN)<br />
The 2008 FM 3-0 states that a PIR is a requirement<br />
that the commander and staff need to understand<br />
the adversary or the operational environment and<br />
can identify information about the enemy, terrain<br />
and weather, and civil considerations. 29 All major operations<br />
combine <strong>of</strong>fensive, defensive, and stability<br />
elements. PIRs that support COIN operations are <strong>of</strong>ten<br />
different than conventional operations’ PIR. This<br />
is not to suggest that creating PIR for conventional<br />
<strong>of</strong>fensive and defensive operations is not difficult<br />
or complex. PIRs for these types <strong>of</strong> operations are<br />
simply understood better by our senior <strong>of</strong>ficers and<br />
are more <strong>of</strong>ten tied to decisions or situations they<br />
have been trained to make by the Army’s training<br />
and education centers before 9/11. Stability operations,<br />
particularly ones with an irregular war-<br />
fare (e.g., COIN) operational theme, differ distinctly<br />
from <strong>of</strong>fensive and defensive operations. 30<br />
Successful COIN operations rely heavily on good<br />
intelligence and a thorough understanding <strong>of</strong> the<br />
enemy. “Counterinsurgents have to understand that<br />
[every situation is different] in as nuanced a manner<br />
as possible, and then with that kind <strong>of</strong> understanding<br />
try to craft a comprehensive approach to<br />
the problems.” 31 Insurgencies are struggles for control<br />
over contested political space, between a state<br />
(or group <strong>of</strong> states or occupying powers), and one<br />
or more popularly based, non-state challengers. 32<br />
Insurgencies are fought in a complex environment<br />
consisting <strong>of</strong> government; physical terrain; information,<br />
propaganda, and the 24 hour news cycle; insurgent<br />
ideology; refugees, displaced persons, and<br />
mass migration; ethnic, tribal, clan or community<br />
groups; nongovernmental and private volunteer<br />
organizations; armed private contractors; porous<br />
borders; external funding; social classes; local and<br />
foreign armed groups; urban and rural populations;<br />
economic and political institutions; unemployment;<br />
crime; bandits; narcotics traffickers; smugglers;<br />
couriers; black marketers; and religious parties. 33<br />
Many independent and interlinked individuals and<br />
groups contribute to the complexity.<br />
Because COIN operations are dispersed, a counterinsurgent’s<br />
own actions are a key generator <strong>of</strong> intelligence.<br />
Operations produce intelligence that drives<br />
subsequent operations. 34 “Reporting by units, members<br />
<strong>of</strong> the country team, and associated civilian<br />
agencies is <strong>of</strong>ten <strong>of</strong> greater importance than reporting<br />
by specialized intelligence assets. These factors,<br />
along with the need to generate a favorable tempo<br />
(rate <strong>of</strong> military operations), drive the requirement to<br />
produce and disseminate intelligence at the lowest<br />
practical level.” 35 Collection with ISR and non-ISR<br />
assets occurs at all echelons. 36 Additionally, effective<br />
COIN operations are decentralized; local commanders<br />
have the best grasp <strong>of</strong> their situations. 37<br />
As previously discussed, it is important to observe<br />
the linkage between PIRs and collection management<br />
since PIRs should drive all future collection<br />
and analytical priorities. In today’s current COIN<br />
environments, divisions and corps are not maneuvering<br />
combat formations as in conventional “high<br />
intensity” <strong>of</strong>fensive or defensive operations. There<br />
are few, if any, decision points and immediate decisions<br />
a division or corps commander need to make.<br />
April - June 2009 21
Combat operations are executed in a decentralized<br />
manner by “empowered” BCTs who are responsible<br />
as the battle space owner for a defined area <strong>of</strong> operation.<br />
BCTs drive daily collection requirements<br />
based upon broadly defined guidance to include PIR<br />
and SIR and Commander’s Intent which is usually<br />
summarized in a written or verbal division fragmentary<br />
order to subordinate units. BCTs must translate<br />
this broad collection guidance and division ISR<br />
objectives and priorities into operational plans with<br />
clearly defined collection tasks and purposes.<br />
To ensure that intelligence collection is synchronized,<br />
the overall intelligence synchronization plan<br />
ensures that PIRs are nested at all echelons; they<br />
can be tailored to local or regional circumstances<br />
but tactical and operational collection efforts should<br />
support one another. Additionally, a headquarters<br />
monitors requests for information from lower echelons<br />
and taskings from higher which assists to validate<br />
the synchronization effort. Also, operational<br />
and some tactical ISR synchronization assists host<br />
nation, inter-agency, inter-service, and multinational<br />
efforts. These in turn can provide valuable information<br />
that assists in answering a unit’s PIR. 38<br />
Finally, because every Soldier is a potential collector,<br />
the intelligence synchronization plan addresses<br />
day to day tactical operations; every patrol or mission<br />
should be given intelligence collection requirements<br />
as well as operations requirements. 39<br />
Because COIN operations by their very nature are<br />
decentralized and lower level commanders have a<br />
better understanding <strong>of</strong> the operational environment,<br />
higher level commanders have different and,<br />
in many cases, less decisions to make. Directly related,<br />
transformation has removed the traditional<br />
tools <strong>of</strong> influence, particularly for division level commanders,<br />
altering or removing decisions that a pre-<br />
Transformation division commander may have had<br />
to make. Thus, the synchronization plan should be<br />
less restrictive and constraining the higher a headquarters<br />
given the fewer decisions required and/or<br />
the larger degree <strong>of</strong> time to decide. This facilitates<br />
the flexibility, nimbleness, and decentralization required<br />
during COIN operations.<br />
Conclusion<br />
PIRs are an important part <strong>of</strong> understanding the<br />
threat we face, the operational environment as a<br />
whole, and what decisions a commander may have<br />
to make. PIRs help commanders to both visual-<br />
ize the operational environment and facilitate both<br />
planning and decisionmaking. PIRs have changed<br />
and are no longer rigid and inflexible with the intent<br />
<strong>of</strong> providing answers to a checklist <strong>of</strong> questions.<br />
Operations and intelligence doctrine have<br />
evolved to fully appreciate the complexity <strong>of</strong> today’s<br />
battlefield. Today’s senior leaders and military intelligence<br />
pr<strong>of</strong>essionals must be educated on these<br />
changes.<br />
Today’s complex operational environment requires<br />
less prescriptive processes and thinking<br />
and more commanders’ coup d’oeil or intuition 40<br />
based on information, intelligence, and experience.<br />
As our doctrine has evolved along with our<br />
strategic requirements, our processes for asking<br />
the right questions have changed. Senior field<br />
grade and general <strong>of</strong>ficers today must have the<br />
mental agility to acknowledge that the processes<br />
and doctrine <strong>of</strong> the 1980s and 1990s do not meet<br />
all challenges we face today. Simply put, all operations<br />
are contextually and operationally dependent;<br />
PIRs based on conventional <strong>of</strong>fensive or<br />
defensive operations differ from COIN. Also, transformation<br />
has changed the methods and scope <strong>of</strong><br />
influencing the battle space. BCTs today have as<br />
much combat power, technology, and situational<br />
awareness as divisions <strong>of</strong> the past. Brigade and<br />
lower and division and higher commander’s roles<br />
have changed and with it, the type <strong>of</strong> intelligence<br />
required and the type and timeliness <strong>of</strong> decisions<br />
these commanders have to make. Today’s commanders<br />
must put away their antiquated understanding<br />
<strong>of</strong> PIRs they grew up with during their<br />
formative years and recognize that PIRs will vary<br />
for <strong>of</strong>fensive, defensive, and stability operations<br />
and are not solely tied to immediate decisions or<br />
decision points.<br />
Endnotes<br />
1. Major Frank A. Smith, “<strong>Intelligence</strong> Transformation: Using Threat<br />
Characteristics to Define Division Capabilities” (Fort Leavenworth,<br />
Kansas: Command and General Staff College, 25 May 2006), 56, at<br />
http:// www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA450630&Location<br />
=U2&doc= GetTRDoc.pdf.<br />
2. For the purposes <strong>of</strong> this article, operational commanders refer<br />
to tactical BCT, division, and corps Commanders, and the G3,<br />
Chief <strong>of</strong> Staff, and Assistant Commanders in divisions and corps<br />
organizations; <strong>of</strong>ficers primarily from the Infantry but also from the<br />
Armor, Artillery, and Aviation branches. These are the key leaders<br />
leading transformed BCTs and today’s tactical and operational<br />
organizations or running the staffs <strong>of</strong> these organizations.<br />
22 <strong>Military</strong> <strong>Intelligence</strong>
3. David Jablonsky, “US <strong>Military</strong> Doctrine and the Revolution in<br />
<strong>Military</strong> Affairs”, Parameters, Autumn 1994, 21-22 at http://www.<br />
carlisle.army.mil/usawc/parameters/1994/jablonsk.htm.<br />
4. FM 100-5, Operations, 20 August 1982, 8-4.<br />
5. FM 100-5, Operations, 5 May 1986, i.<br />
6. John L. Romjue, <strong>American</strong> Army Doctrine for the Post-Cold<br />
War (Fort Monroe, Virginia: TRADOC Historical Monograph<br />
Services, 1996), 132 at http://www.dtic.mil/cgi-bin/<br />
GetTRDoc?AD=ADA317654&Location= U2&doc=GetTRDoc.pdf.<br />
7. FM 3-0, Operations, 27 February 2008, Forward, at http://www.<br />
dtic.mil/doctrine/jel/service_pubs/fm3_0a.pdf.<br />
8. Lieutenant Colonel Joseph P. DeAntona, “Transforming the<br />
Operational Career Field Officer Path: Preparing Leaders for Today’s<br />
Contemporary Operating Environment and to Lead the Army into<br />
the 21st Century” (Carlisle Barracks, Pennsylvania: U.S. Army War<br />
College, 18 March 2005), 2 at http://www.strategicstudies institute.<br />
army.mil/pdffiles/ksil29.pdf.<br />
9. Julian E. Barnes, “Hard-Learned Lessons”, U.S. News & World<br />
Report, 19 March 2006 at http://www.usnews.com/usnews/news/<br />
articles/060327/27military.htm.<br />
10. FM 34-2, Collection Management and Synchronization Planning,<br />
8 March 1994), 3-6 at http://www.fas.org/irp/doddir/army/<br />
fm34-2/toc.htm.<br />
11. Ibid., 3-14.<br />
12. FM 2-0, <strong>Intelligence</strong>, 17 May 2004, 1-11 at www.fas.org/irp/<br />
doddir/army/fm2-0.pdf.<br />
13. FM 3-0, 27 February 2008, 5-8.<br />
14. Ibid., 5-9.<br />
15. FMI 2-01, ISR Synchronisation, 1 November 2008, 1-6.<br />
16. Smith, 60.<br />
17. John J. Magrath, “An Army at War: Change in the Midst <strong>of</strong><br />
Conflict: The Proceedings <strong>of</strong> the Combat Studies Institute 2005<br />
<strong>Military</strong> History Symposium” (Fort Leavenworth, Kansas: Combat<br />
Studies Institute Press, 2-4 August 2005), 356 at http://www-cgsc.<br />
army.mil/carl/resources/csi/content.asp#army.<br />
18. Joe Burlas “Actionable <strong>Intelligence</strong> Relies on Every Soldier”,<br />
Army News Service, April 13, 2004 at http://www4.army.mil/ocpa/<br />
read.php?story_id_key=5847.<br />
19. Headquarters, Department <strong>of</strong> the Army, United States Army 2004<br />
Transformation Roadmap (Washington, D.C.: Army Transformation<br />
Office, July 2004), 5-15 at http://www.dtic.mil/futurejointwarfare/<br />
strategic/army_trans_roadmap.pdf.<br />
20. Ibid.<br />
21. FM 34-2, D-1; FMI 2-01, 1-12; FM 3-0, 27 February 2008, 5-9.<br />
22. FM 34-2, 3-7; FMI 2-01, 2-4.<br />
23. FM 5-0, Army Planning and Orders Production, 20 January<br />
2005, Chapter 3, and FMI 2-01, Chapter 1.<br />
24. FM 34-2, D1 to D2.<br />
25. FM 34-8-2, <strong>Intelligence</strong> Officer’s Handbook, 1 May 1998, D-2 at<br />
http://www.fas.org/irp/doddir/army/fm34-8-2.pdf.<br />
26. ST 2-50.4 (FM 34-8), Combat Commanders Handbook on<br />
<strong>Intelligence</strong> (Fort Huachuca, AZ: United States Army <strong>Intelligence</strong><br />
Center and Fort Huachuca, AZ, 6 September 2001), B-2. https://<br />
rdl.train.army. mil/soldierPortal/atia/adlsc/view/public/8684-1/<br />
st/2-50.4/st2-50.4.htm<br />
27. FMI 2-01, 2-5.<br />
28. Ibid., 4-2.<br />
29. FM 3-0, 27 February 2008, 5-9.<br />
30. Ibid., 2-3 to 2-4.<br />
31. Carlotta Gall, “Insurgents in Afghanistan Are Gaining,<br />
Petraeus Says”, The New York Times, 30 September 2008 at<br />
http://www.nytimes.com/2008/10/01/world/asia/01petraeus.<br />
html?partner=rssnyt&emc =rss.<br />
32. Dr. David J. Kilcullen, “Three Pillars <strong>of</strong> Counterinsurgency:<br />
Remarks Delivered at the U.S. Government Counterinsurgency<br />
Conference”, Washington D.C., 28 September 2006 at www.au.af.<br />
mil/au/awc/awcgate/ uscoin/3pillars_<strong>of</strong>_counterinsurgency.pdf.<br />
33. FM 3-24, Counterinsurgency, 15 December 2006, 3-3 to 3-4,<br />
3-13 at https://rdl.train.army.mil/soldierPortal/atia/adlsc/view/<br />
public/23285-1/FM/3-24/FM3_24.PDF.<br />
34. Ibid,, 3-1.<br />
35. Ibid., 1-23.<br />
36. Ibid., 3-24.<br />
37. Ibid., 1-26.<br />
38. Ibid., 3-25.<br />
39. FM 3-24, 3-27.<br />
40. Carl von Clausewitz, On War. Edited and translated by Michael<br />
Howard and Peter Paret (Princeton, New Jersey: Princeton University<br />
Press, 1976), 112.<br />
Lieutenant Colonel William G. McDonough, U.S. Army, has<br />
served for the past 25 years in a variety <strong>of</strong> assignments<br />
from the platoon to corps level as an Infantry and MI<br />
Soldier to include deployments in support <strong>of</strong> Operations<br />
Hurricane Andrew, Restore Hope, Uphold Democracy,<br />
Joint Endeavor, and Enduring Freedom IV and VII. He is<br />
currently the G2 Analysis and Control Element Chief for<br />
the 10 th Mountain Division (LI) supporting Operation Iraqi<br />
Freedom VI. He holds a BA and MA in History from the<br />
California State University, Sacramento; an MS in <strong>Military</strong><br />
Operational Art and Science from the Air Command and<br />
Staff College; and a MS in Airpower Arts and Science from<br />
the School <strong>of</strong> Advanced Air and Space Studies.<br />
Lieutenant Colonel John A. (Jake) Conway, U.S. Army, has<br />
served for the past 20 years in a variety <strong>of</strong> artillery and<br />
military intelligence positions to include Infantry Battalion S2<br />
in support <strong>of</strong> Operation Uphold/Maintain Democracy and BCT<br />
S2 in support <strong>of</strong> Operation Iraqi Freedom IV. He is currently<br />
the G2 for the 10 th Mountain Division (LI) supporting Operation<br />
Iraqi Freedom VI. He holds a BA in Pre Law from Penn State<br />
University, an MA in Management from Webster University,<br />
St. Louis, Missouri, and is a graduate <strong>of</strong> the Post-Graduate<br />
<strong>Intelligence</strong> Program, Washington D.C.<br />
April - June 2009 23
y Chaplain (Lieutenant Colonel) Kenneth Lawson<br />
Introduction<br />
Army chaplains and chaplain assistants serving in Afghanistan have numerous opportunities to interact<br />
with local Muslim clergy. The mullah, or religious leader, <strong>of</strong> a village is a vital element <strong>of</strong> village political,<br />
religious, and cultural life. Many chaplains reach out to mullahs as points <strong>of</strong> contact for humanitarian<br />
activities (donating school supplies; rebuilding orphanages; distributing gifts and candy to Afghan children<br />
in hospital) conducted by U.S. Soldiers. With the permission <strong>of</strong> unit commanders, chaplains frequently<br />
engage in these humanitarian missions.<br />
A potential controversy exists when a chaplain is asked for specific information from commanders or intelligence<br />
<strong>of</strong>ficers related to his interaction with local mullahs. Chaplains, as doctrinal non-combatants,<br />
could be placed in the awkward position <strong>of</strong> providing targeting information to commanders, a combatant<br />
task. In order to examine the doctrinal tension between chaplains and Information Operations (IO), we will<br />
first review the roles and responsibilities <strong>of</strong> Army chaplains. Next we will examine the components and<br />
capabilities <strong>of</strong> IO. Finally, a discussion <strong>of</strong> chaplains’ experiences in Afghanistan related to mullah engagements<br />
(religious leader liaison) and IO will illustrate the tensions in this fragile relationship with suggestions<br />
for success for the overall mission <strong>of</strong> the commander.<br />
Doctrinal Guidelines<br />
The two guiding Army documents that articulate the roles and responsibilities <strong>of</strong> chaplains are Field<br />
Manual (FM) 1-05, Religious Support, and Army Regulation (AR) 165-1, Chaplain Activities in the United<br />
States Army. The First Amendment <strong>of</strong> the U.S. Constitution, reinforced by Title 10 <strong>of</strong> the U.S. Code, guarantees<br />
every <strong>American</strong> the right to the free exercise <strong>of</strong> religion. <strong>American</strong>s in the military enjoy this right as<br />
well as civilians. Commanders are responsible for insuring the religious freedoms <strong>of</strong> their troops through<br />
the chaplain as a staff <strong>of</strong>ficer. FM 1-05 states:<br />
The mission <strong>of</strong> the Unit Ministry Team (UMT) is to provide and perform religious support to soldiers, families, and<br />
authorized civilians as directed by the commander. Chaplains serve as personal staff <strong>of</strong>ficers to commanders at<br />
all levels <strong>of</strong> the command providing essential information on troop and unit morale, quality <strong>of</strong> life matters, free<br />
exercise <strong>of</strong> religion issues, ethical decision making, and the impact <strong>of</strong> religion on the operation. 1<br />
The religious support activities <strong>of</strong> chaplains are widely known. They consist <strong>of</strong> religious services, counseling,<br />
religious education, advisor to the commander and staff, and other activities, including coordinating<br />
“religious/humanitarian support.” The FM states that such support includes humanitarian support<br />
programs on issues <strong>of</strong> religion, morale, morals, and ethics.” 2 The chaplain, by doctrine, then is to assist<br />
24 <strong>Military</strong> <strong>Intelligence</strong>
the commander with religious/humanitarian support. Chaplains are also, by regulation, to “provide liaison<br />
to indigenous religious leaders in close coordination with the G5.” 3 Additionally, chaplains coordinate<br />
with elements <strong>of</strong> the G9 (Civil Affairs) in religious liaison/mullah engagements. 4<br />
Information Operations<br />
Based primarily on advanced technology, IO is an element <strong>of</strong> combat power. It encompasses attacking<br />
adversary command and control (C2) systems while protecting friendly C2 from adversary disruption.<br />
Thus IO has both <strong>of</strong>fensive and defensive capabilities. The goal <strong>of</strong> IO is to produce information<br />
superiority over the enemy at decisive points. Commanders conduct IO to apply combat power to<br />
achieve information superiority on the battlefield. Enemy intelligence, surveillance, reconnaissance<br />
(ISR), and targeting are all part <strong>of</strong> IO. Offensive IO seeks to destroy, degrade, disrupt, deny, deceive,<br />
and exploit enemy forces. A high value target <strong>of</strong> IO is enemy center <strong>of</strong> gravity, typically communication<br />
and headquarters locations, to target enemy decision makers and information systems.<br />
IO maximizes the use <strong>of</strong> technology to shape the combat power <strong>of</strong> friendly forces. In FM 3-13, Information<br />
Operations, the following summary <strong>of</strong> IO is provided:<br />
“Commanders conduct (plan, prepare, execute, and assess) IO to apply the information element <strong>of</strong> combat<br />
power. Combined with information management and ISR operations; effective IO results in gaining and<br />
maintaining information superiority. Information superiority creates conditions that allow commanders to<br />
shape the operational environment and enhance the effects <strong>of</strong> all elements <strong>of</strong> combat power. IO has two<br />
categories, <strong>of</strong>fensive IO and defensive IO. Commanders conduct IO by synchronizing IO elements and related<br />
activities, each <strong>of</strong> which may be used either <strong>of</strong>fensively or defensively.”<br />
“IO brings together several previously separate functions as IO elements and related activities. To provide unity<br />
<strong>of</strong> effort, IO is placed under a special staff <strong>of</strong>ficer, the assistant chief <strong>of</strong> staff G7. The G7 has coordinating<br />
staff responsibility for IO. He does this by means <strong>of</strong> the G7 section and IO cell. Placing responsibility for<br />
synchronizing the activities <strong>of</strong> the IO elements and related activities on one special staff <strong>of</strong>ficer helps<br />
commanders mass their effects to gain and maintain information superiority.” 5<br />
The Army chaplain is a noncombatant. As a religious leader and a staff <strong>of</strong>ficer, AR 165-1 states,<br />
“Chaplains are noncombatants and will not bear arms.” 6 This regulation is clear enough. The confusion<br />
relates to the idea <strong>of</strong> information as a weapon, and that a chaplain may receive information that IO personnel<br />
in the G2, G3, or G7 would like to use in <strong>of</strong>fensive action against enemy forces. There is no approved<br />
doctrinal standard for the role <strong>of</strong> the chaplain in IO. However, AR 165-1 does suggest possible<br />
roles <strong>of</strong> the chaplain. For example, it states that, “Commanders will detail or assign chaplains only to<br />
duties related to their pr<strong>of</strong>ession. Chaplains may perform unrelated duties in a temporary military emergency.”<br />
It also states that a commander will not detail a chaplain as an “information” <strong>of</strong>ficer. AR 165-1<br />
further states, “Commanders will not…require a chaplain to serve in a capacity in which he or she may<br />
later be called upon to reveal privileged or sensitive information incident to such service.” 7<br />
The Army chaplain will have some role in advising the commander on religious and cultural issues in<br />
the area <strong>of</strong> operations (AO). FM 1-05 states that the chaplain will provide “support to the commander<br />
on matters <strong>of</strong> religion, morals, and morale, as affected by religion and the impact <strong>of</strong> indigenous religions<br />
on the military mission.” 8 It further states that the chaplain will “provide liaison to indigenous religious<br />
leaders in close coordination with the G5/S5.” 9 The question remains: “At what point does a chaplain as<br />
a religious advisor to the commander cross the line and partake <strong>of</strong> combatant activities in IO?”<br />
Army chaplains concerned about their involvement with IO are on safe ground when they concentrate<br />
their efforts primarily on providing religious support to soldiers. Religious support includes religious services,<br />
rites, sacraments, ordinances, pastoral care and counseling, religious education, and humanitarian<br />
support. As a staff <strong>of</strong>ficer, the chaplain supports the commander and staff, administrates, and acts<br />
as an advisor to the command on indigenous religions. 10 As one chaplain stated, “It is conceivable to witness<br />
commanders demanding that chaplains provide information advantageous to U.S. forces that may<br />
April - June 2009 25
A mullah engagement in October 2003 sponsored by the CJTF-<br />
180. This religious liaison was hosted by CH (LTC) Ken Sampson,<br />
back row, far left. Photo by MSG Bruce Snowdeal.<br />
be gleaned from a liaison and contact with local religious<br />
leaders. One would be naïve to think that the<br />
chaplaincy would be exempt from the pressure <strong>of</strong> a<br />
well-meaning but ill-advised commander.” 11 The focus<br />
<strong>of</strong> chaplain ministries must first be on religious<br />
support to the soldiers within the unit and not on<br />
humanitarian missions to indigenous peoples.<br />
The expanding role <strong>of</strong> religion in contemporary<br />
operations will increase the requests for religious<br />
advice on local populations. The senior chaplain<br />
should be a subject matter expert in this area, a key<br />
point <strong>of</strong> contact in advising the commander. When<br />
the opportunity arises to perform a religious liaison<br />
with local clergy, such as the mullah engagements<br />
in Afghanistan, chaplains should follow the following<br />
guidelines:<br />
Ê A religious liaison mission must be endorsed by the commander.<br />
Ê The chaplain must staff his intentions with the G2, G3, G5 and G9 sections.<br />
Ê Only chaplains <strong>of</strong> field grade (Major) or higher should participate.<br />
Ê Emphasis should be on common humanitarian and religious concerns and not on political/military<br />
matters.<br />
Ê After the mission, chaplains are not to provide information related to targeting or <strong>of</strong>fensive operations<br />
to the command. Some non-lethal targeting information may be appropriately shared with the command,<br />
such as the location <strong>of</strong> schools, religious sites, and orphanages.<br />
In stability and support operations, chaplains will have an increasing role in engaging indigenous<br />
religious leaders to help facilitate the peace keeping and nation building missions <strong>of</strong> U.S. troops. This<br />
liaison role <strong>of</strong> Army chaplains with local clergy must be practiced with caution, as more and more<br />
demand on chaplain religious expertise will be requested by IO personnel. As one chaplain warned,<br />
“Caution must be applied to avoid the slippery slope <strong>of</strong> grasping for a deeper and inappropriate role.<br />
With an increasing command emphasis on IO, the [Chaplain] Corps must guard against justifying its<br />
value in its role in IO.” 12 The role <strong>of</strong> a chaplain is justified as a provider <strong>of</strong> religious support to all soldiers,<br />
not as a tool <strong>of</strong> IO to coerce intelligence from indigenous clergy.<br />
The Role <strong>of</strong> Religion in IO<br />
In Operation Enduring Freedom, religious issues weighed heavily in the commander’s decision making<br />
process. Religion served as a source <strong>of</strong> information and as a type <strong>of</strong> information. As foreigners in a<br />
Muslim land, the sensitivity to religious issues for U.S. troops in Afghanistan was paramount. The customs<br />
and rituals <strong>of</strong> Islam are unknown to most <strong>American</strong>s, making it increasingly important for chaplains<br />
to advise commanders and soldiers on the religious/spiritual aspects <strong>of</strong> indigenous Afghans. 13<br />
Chaplains are expected to provide the commander information related to the religious customs and<br />
practices <strong>of</strong> indigenous peoples. In Afghanistan, the typical U.S. soldier has no idea <strong>of</strong> the differences<br />
between Sunni or Shiite, and between a mullah and an imam. First, the chaplain must determine what<br />
types <strong>of</strong> religious information are essential for the commander to understand. Next, the chaplain analyzes<br />
the local population to see how it understands these categories. Finally, the chaplain briefs the<br />
commander and staff and soldiers as appropriate. This type <strong>of</strong> religious advice to a commander is standard<br />
practice in the Army chaplaincy, a typical responsibility understood by all chaplains.<br />
Army chaplains are not in the intelligence gathering business. Chaplains, as religious advisors, must not<br />
allow themselves to drift too far into the realm <strong>of</strong> IO. It is one thing to interact with local religious leaders<br />
26 <strong>Military</strong> <strong>Intelligence</strong>
to facilitate dialogue and understanding to better advise the commander on the impact <strong>of</strong> local religions<br />
on the military mission. It is another thing altogether for a chaplain to gather information in a religious<br />
liaison capacity that unethically could be used for targeting or other <strong>of</strong>fensive operations. 14 Afghan religious<br />
leaders place a high value on clergy. The U.S. Army chaplain can engage in a respectful dialogue and<br />
exchange <strong>of</strong> ideas and cultural sensitivities in discussions with indigenous clergy. But the sacredness <strong>of</strong><br />
such dialogue must not be compromised by IO personnel eager to glean any information from the chaplain<br />
that may help their mission. A military chaplain who compromises the sacred bond between clergy will be<br />
instantly discredited by Afghan clerics, promoting distrust and disdain <strong>of</strong> all U.S. personnel.<br />
There are some legitimate ways a chaplain can serve as a staff <strong>of</strong>ficer in general support <strong>of</strong> IO. Chaplains<br />
working as liaisons with indigenous clergy can have a positive influence on the way <strong>American</strong> intentions<br />
and operations are perceived. These chaplain “liaison <strong>of</strong>ficers” are a part <strong>of</strong> IO and require a thorough<br />
understanding <strong>of</strong> the key religious leaders, religious worldview <strong>of</strong> the population, and social structure.<br />
The G2, G3, G5, and IO personnel <strong>of</strong>ten overlook or under emphasize this understanding. The staff chaplain,<br />
as a liaison with indigenous clergy, can be a crucial person in the analysis <strong>of</strong> religion and culture in<br />
IO, preventing U.S. and allied troops from committing cultural or religious blunders. For example, Joint<br />
Publication (JP) 1-05 allows the chaplain to advise commanders through their liaison roles with host nation<br />
religious leaders. Army Field Manual 1-05 states the same thing, instructing chaplains to support the<br />
Commander through relationships with indigenous clergy. 15<br />
The optimal time to integrate the analysis <strong>of</strong> religion and culture is during the mission analysis phase<br />
<strong>of</strong> the military decision making process (MDMP). This responsibility generally falls upon the G2/J2 Plans<br />
section. Here the chaplain can provide input as to the role <strong>of</strong> religion on military operations. Since IO sections<br />
can be small and limited in time and religious resources, ad hoc members are necessary to develop<br />
the cultural analysis requirement. It is here that a staff chaplain can contribute significantly. During the<br />
mission analysis, the IO section develops the IO <strong>Intelligence</strong> Preparation <strong>of</strong> the Battlespace (IPB). Essential<br />
elements <strong>of</strong> IO IPB include: an in-depth analysis <strong>of</strong> religion; an awareness <strong>of</strong> important religious and cultural<br />
dates and observances; an understanding <strong>of</strong> religious and social structure, and recognition <strong>of</strong> key<br />
religious leaders and their probable influence.<br />
FM 3-13 defines IO as “…the employment <strong>of</strong> the core capabilities <strong>of</strong> electronic warfare, computer network<br />
operations, psychological operations, military deception, and operations security, in concert with specified<br />
supporting and related capabilities, to affect or defend information and information systems, and to influence<br />
decision making.” 16 The FM specifically excludes the chaplain from the list <strong>of</strong> coordinating, special,<br />
and personal staff who have IO planning and support responsibilities. UMT personnel, both chaplains and<br />
chaplain assistants, should not be involved in the planning or execution <strong>of</strong> IO with the sole exceptions <strong>of</strong><br />
security for themselves and friendly forces and the location <strong>of</strong> sacred or humanitarian sites.<br />
All the core and supporting IO capabilities and functions, with the exception <strong>of</strong> operational and physical<br />
security, are either combatant tasks which chaplains, as noncombatants, are not legally authorized to directly<br />
engage in or highly technical tasks which are outside the realm <strong>of</strong> chaplain’s pr<strong>of</strong>essional responsibilities.<br />
Chaplain assistants, though combatants, should not be involved in the planning or execution <strong>of</strong> IO<br />
with the same exceptions, because their close association with the chaplain could create the appearance<br />
or contribute to the perception <strong>of</strong> the chaplain’s involvement in IO. 17<br />
Chaplains as Liaisons with Indigenous Clergy and IO<br />
Afghanistan is a religious country. Almost 100 percent <strong>of</strong> Afghans practice some type <strong>of</strong> Islam. Religion is<br />
a major cultural factor throughout all levels <strong>of</strong> the society. The role <strong>of</strong> religion and clergy in peacekeeping<br />
and nation building here must not be devalued. Most senior U.S. Army chaplains, as clergy and as <strong>of</strong>ficers,<br />
are well suited to advise commanders on religious issues and to act as intermediaries between military and<br />
indigenous religious leaders. Chaplains are positioned to communicate with local religious leaders to promote<br />
trust, coordination, problem solving, and to reduce local violence. 18 They can serve their commanders<br />
by acting as mediators with local mullahs or imams to build a relationship for civil military operations<br />
April - June 2009 27
(CMO). Any role for a chaplain as a liaison with indigenous clergy must be balanced by security concerns,<br />
by the commander’s intent, and by the skills and willingness <strong>of</strong> the chaplain. Some chaplains, for theological<br />
reasons, opt not to serve as religious liaisons to local clergy.<br />
The primary role <strong>of</strong> Army chaplains is to minister to the troops, the commander, and his staff. But chaplains<br />
as staff <strong>of</strong>ficers do have a role in networking with indigenous clergy. Chaplains can help to win the<br />
hearts and minds <strong>of</strong> local populations in support <strong>of</strong> U.S. policies to rebuild a peaceful Afghanistan which<br />
lawfully elects its own leaders and maintains a civil and humane society. The role <strong>of</strong> Army chaplains as<br />
liaisons with local clergy is mentioned in FM 1-05, which states: “Chaplains will support the commander<br />
through advisement in the following areas that may influence CMO: Relations with indigenous religious<br />
leaders when directed by the commander.” 19 When Army chaplains serve in a Joint Task Force or similar<br />
assignment with Navy, Air Force, or Marine personnel, Joint Publication (JP) 1-05 provides guidance on<br />
chaplains as religious liaisons. Approved by the Joint Chiefs <strong>of</strong> Staff, JP 1-05, Religious Support in Joint<br />
Operations, states:<br />
The JFCH [Joint Force Chaplain], after careful consideration and only with the Joint Force Commander’s<br />
approval, may serve as a point <strong>of</strong> contact to host nation (HN) civilian and military religious leaders,<br />
institutions, and organizations, including established and emerging military chaplaincies, through the<br />
Civil-<strong>Military</strong> Operations Center. 20<br />
As clergy and non-combatants, Army chaplains are respected in the Muslim world. By this status<br />
they are in a position to build bridges and networks with indigenous clergy. Unquestionably, the<br />
chaplain’s primary role is to provide religious support to Soldiers and their families, yet the role <strong>of</strong> a<br />
chaplain as a liaison to local clergy is clearly mentioned in various military publications. The doctrinal<br />
guidance is broad, giving commanders and chaplains flexibility in determining how best to fulfill this<br />
responsibility. Due to the ongoing nature <strong>of</strong> the War on Terror in Afghanistan, the U.S. will maintain<br />
peacekeeping, nation building, and stability operations for the foreseeable future. Since military personnel<br />
will have to engage the local population more and more in these operations, chaplains must be<br />
prepared to dialogue and interact with indigenous religious and community leaders.<br />
This is not an unusual or unrealistic expectation. In Afghanistan, military Judge Advocate General<br />
<strong>of</strong>ficers routinely work with the Afghan legal system; military surgeons work closely with Afghan community<br />
medical services; military engineers are active throughout Afghanistan working with local<br />
contractors on a wide array <strong>of</strong> construction projects; military Civil Affairs soldiers are active in rebuilding<br />
schools and donating school supplies to Afghani children; and military chaplains throughout<br />
Afghanistan are interacting with local mullahs and imams.<br />
Army chaplains routinely coordinate or assist with humanitarian and religious liaison missions.<br />
Because <strong>of</strong> these relationships with indigenous clergy, knowledge is gained through informal conversations<br />
that may contain information related to the U.S. military mission. Unsolicited information that<br />
affects the security <strong>of</strong> U.S. and allied forces should be reported. Relaying information about threats<br />
against U.S. interests does not violate the non-combatant status <strong>of</strong> a chaplain. But the chaplain who<br />
uses his religious status to gain intelligence from indigenous clergy with the intent <strong>of</strong> feeding that information<br />
to the G2, G3, or the IO staff has crossed the line and has assumed combative targeting<br />
tasks in violation <strong>of</strong> the non-combatant status <strong>of</strong> chaplains.<br />
Chaplains must instruct their commanders and the command staff as to the roles and responsibilities <strong>of</strong><br />
a chaplain related to IO. It can not be assumed that a commander or a command staff will know the details<br />
<strong>of</strong> what a chaplain can or cannot do related to the chaplain’s non-combative status. Commanders must<br />
take care not to utilize chaplains against military regulations. FM 1-05 states, “Under Title X <strong>of</strong> the U.S.<br />
Code, Chaplains should not perform the following: Human <strong>Intelligence</strong> (HUMINT) collection and/or target<br />
acquisition.” 21 Commanders must not utilize chaplains as intelligence <strong>of</strong>ficers. Chaplains are responsible<br />
for advising the commander when such expectations are prevalent. No military regulation states precisely<br />
28 <strong>Military</strong> <strong>Intelligence</strong>
what information a chaplain should or should not relay to the IO staff. The guiding principles are military<br />
regulations, maintaining the chaplain’s credibility with indigenous religious leaders, guidance from the<br />
commander, input from supervisory chaplains, and the conscience <strong>of</strong> the individual chaplain. These flexible<br />
guidelines must be assessed in light <strong>of</strong> the chaplain’s clear understanding <strong>of</strong> his non-combatant role.<br />
Army chaplains in Afghanistan were frequently involved with humanitarian missions. These missions,<br />
typically coordinated by chaplains with local mullahs, helped to renovate schools, supply orphanages,<br />
and rebuild mosques. Falling under the general identification <strong>of</strong> CMO, chaplains on humanitarian<br />
missions <strong>of</strong>ten worked with Civil Affairs <strong>of</strong>ficers and Public Affairs. In such relationships the chaplain<br />
must protect his non-combatant status, in that both Civil Affairs and Public Affairs soldiers routinely<br />
contribute intelligence to IO. In a Muslim culture, a U.S. Army chaplain is considered a clergyman, a<br />
person <strong>of</strong> esteem at the level <strong>of</strong> a mullah. The chaplain must ensure that his credibility is not compromised<br />
by working on CMO projects with other soldiers who are combatants. As one chaplain stated,<br />
“UMTs should…avoid the appearance <strong>of</strong> involvement in the execution <strong>of</strong> IO related activities to avoid<br />
undermining their credibility in support <strong>of</strong> CMO. Part <strong>of</strong> the reason that UMTs can be effective in conducting<br />
the CMO related function <strong>of</strong> liaison with indigenous religious groups is because <strong>of</strong> the perception<br />
that as religious leaders they will act as “honest brokers.” 22<br />
Contributions <strong>of</strong> Chaplains to IO: What Can the Chaplain Do?<br />
There are numerous examples <strong>of</strong> chaplains excelling in their role as a liaison or bridge-builder with<br />
local mullahs in Afghanistan. Chaplains were able to successfully perform these liaison and humanitarian<br />
missions without compromising their integrity as non-combatants. An example <strong>of</strong> interacting<br />
with indigenous clergy while rejecting the opportunity to feed intelligence to IO personnel was CH (CPT)<br />
Eric Eliason, who deployed to Afghanistan during 2004. As chaplain to the 1 st Battalion, 19 th Special<br />
Forces Group, CH Eliason refused to provide HUMINT or targeting information while he worked with<br />
local mullahs to coordinate the rebuilding <strong>of</strong> village mosques. 23<br />
An example <strong>of</strong> a senior Army chaplain who properly balanced his roles as a religious leader and a<br />
staff chaplain was CH (LTC) Larry Adams-Thompson, the CJTF 76 Chaplain in Afghanistan from March<br />
2004 through March 2005. Continuing the work <strong>of</strong> his predecessor CH (LTC) Ken Sampson, CH Adams-<br />
Thompson organized monthly meetings with local mullahs. The intent <strong>of</strong> these meetings was to discuss<br />
religious issues, moral concerns, and to build clergy-to-clergy relationships. Chaplains obtained funds<br />
to assist mullahs in the renovation <strong>of</strong> village mosques and orphanages. In one encounter, he learned<br />
that U.S. funds were readily building Afghan public schools but not the traditional religious schools, the<br />
madrassas. This created the perception that the U.S. was secular and not concerned about the religious<br />
needs <strong>of</strong> Afghanistan. CH Adams-Thompson knew that if he could get the construction <strong>of</strong> some madrassas<br />
authorized, a clear message would be sent to the Afghan people that the U.S. cared about the local<br />
religion and culture. In reflecting on the relationship between CH Adams-Thompson and local mullahs:<br />
Note that the feedback from the mullah was not related to combat operations. Rather, it provided an<br />
awareness <strong>of</strong> wider issues in the area <strong>of</strong> responsibility (AOR). CH Adams-Thompson encouraged chaplains<br />
to take similar issues from their meetings with mullahs back to their commanders. This example<br />
demonstrates how chaplains can advise commanding <strong>of</strong>ficers on the ways religion impacts the AOR. Local<br />
religious leaders, who usually are quite influential in their communities, can provide unique viewpoints on<br />
issues and concerns among the populace. Such insight is crucial for commanders, and chaplains are <strong>of</strong>ten<br />
in a unique position to provide it. This information is not tactical; rather, it is situational awareness that<br />
can be utilized to build bridges with the general population. As a result <strong>of</strong> CH Adams-Thompson bringing<br />
the education mullah’s assessment back to the command, approval was given to fund the construction <strong>of</strong><br />
a madrassas in Kapisa Province, the first U.S. effort <strong>of</strong> its kind in Afghanistan. 24<br />
Staff communication between the chaplain and the commander and his staff is essential to maintaining<br />
the unique status <strong>of</strong> chaplains as non-combatants. As chaplains communicated plainly what they<br />
were and were not able to do related to intelligence collection, their commands almost always respected<br />
April - June 2009 29
those boundaries. For example, shortly after arriving in Afghanistan, CH Adams-Thompson met with<br />
the G2 and told them what he could and could not do related to IO. He indicated that during his 12<br />
months in Afghanistan the command never asked him to utilize his connections with indigenous clergy<br />
in an improper manner. It is the responsibility <strong>of</strong> the chaplain as a staff <strong>of</strong>ficer to inform the command<br />
<strong>of</strong> his non-combatant boundaries. 25 Chaplains must be careful not to allow their networking with local<br />
religious leaders to be used inappropriately as targeting or human intelligence collection opportunities.<br />
If chaplains allowed themselves to be debriefed by G2, G3, or IO personnel in order to gain information<br />
related to combat operations, they would place their unique role as clergy non-combatants in jeopardy.<br />
What the chaplain can or cannot do related to interaction with indigenous clergy is guided by the<br />
commander. No commander wants his chaplain kidnapped, killed, or injured. Security for mullah<br />
engagements is a vital consideration. The concern is not only for the Army chaplains but for the local<br />
clergy with whom they meet. There were instances in Afghanistan in which intimidation, violence,<br />
or murder was committed against religious leaders who dialogued with U.S. chaplains. For example,<br />
CH (CPT) Guy McBride <strong>of</strong> the 173 rd Combat Support Battalion, who was in Afghanistan from March<br />
2005 through March 2006, recalled, “The mullah engagements in my area were not successful. I remember<br />
two <strong>of</strong> these engagements, after which both times the mullahs were assassinated.” 26 Careful<br />
consideration must be given as to how much danger local leaders face in relating with U.S. chaplains.<br />
Obviously the opportunity for chaplains to interact with indigenous clergy will be restricted or eliminated<br />
when the danger is too great. Chaplains must balance their roles as advisors to the commander<br />
on local religious issues against operational and force protection concerns.<br />
A religious liaison mullah engagement planned by CH (LTC) Ken<br />
Sampson and hosted by MG Lloyd Austin, Commander, CJTF 180,<br />
Bagram, Afghanistan. MG Austin is in the center <strong>of</strong> the photo.<br />
Photo by MSG Bruce Snowdeal.<br />
While Army chaplains typically enjoyed their interaction<br />
with indigenous clergy, there were moments<br />
<strong>of</strong> apprehension. Occasionally a chaplain<br />
understood that he was very close to becoming an<br />
intelligence <strong>of</strong>ficer gathering targeting information<br />
on the enemy. For example, CH (CPT) Isaac Opara<br />
<strong>of</strong> the 25 th Infantry Division conducted four mullah<br />
engagements during his June 2004 to April<br />
2005 tour in Afghanistan. He lamented that he<br />
did not have set IO guidelines as to what he could<br />
and could not report to his commander and staff.<br />
While helping with the rebuilding <strong>of</strong> schools and<br />
orphanages, he learned many things about the<br />
Afghan people. He stated that he walked “a thin<br />
line between hosting mullah engagements and becoming<br />
an Intel <strong>of</strong>ficer.” He stated, “I did not cross<br />
the line but I was an ear to the local people to hear complaints…I never reported info to anyone except<br />
my brigade chaplain.” 27<br />
Conclusion<br />
To fully develop the role <strong>of</strong> the military chaplain as a religious liaison for the commander, more training<br />
is needed. It is inaccurate to assume that chaplains with the rank <strong>of</strong> major or above are competent<br />
in religious liaison activities. <strong>Military</strong> chaplains must be trained at the major level and above to<br />
dialogue as religious leaders with indigenous clergy; to be sensitive to the religious culture <strong>of</strong> allied<br />
personnel and the HN; to understand mission and situational awareness related to religious issues; to<br />
engage in liaison activities with a clear understanding <strong>of</strong> the Commander’s intent and end state; and<br />
to not be used in any way as an intelligence gathering or targeting tool for IO.<br />
Chaplains <strong>of</strong> the rank <strong>of</strong> major or above are a valuable but underutilized resource in developing the<br />
analysis <strong>of</strong> an adversary’s religion and culture for the MDMP. Many IO missions begin before combat<br />
30 <strong>Military</strong> <strong>Intelligence</strong>
operations, and failure to understand the complexities <strong>of</strong> religion and culture can negatively impact<br />
those operations. Commanders and operations staff <strong>of</strong>ficers should understand that experienced chaplains<br />
can be a valuable multiplier in the total planning process by assisting in developing a religious<br />
impact assessment for the commander and staff. Chaplains should insist on the opportunity to participate<br />
in the process, although such participation is always bound by their status as non-combatants.<br />
Their products are critical for background support to IO, which requires an in-depth understanding <strong>of</strong><br />
culture for operations involving combat, peacekeeping, humanitarian assistance, and civil affairs.<br />
Endnotes<br />
1. FM 1-05, Religious Support, 2003, 1-5.<br />
2. Ibid., p. 1-6.<br />
3. Ibid.<br />
4. Ibid., 4-40.<br />
5. FM 3-13, Information Operations: Doctrine, Tactics, Techniques, and Procedures, 2003, 1-1, 1-2.<br />
6. AR 165-1, Chaplain Activities in the United States Army, 2004, 6.<br />
7. Ibid.<br />
8. FM 1-05, A-1.<br />
9. Ibid., 1-5, 1-6.<br />
10. Ibid., 1-1.<br />
11. Randy Edwards, “Information Operations and the Army Chaplaincy,” Command and General Staff College, unpublished paper, 2003,<br />
3.<br />
12. Ibid., p. 5.<br />
13. The term “religious/spiritual” refers to the system <strong>of</strong> beliefs and practices that give meaning and purpose to people’s lives, FM 1-05,<br />
F-1.<br />
14. Greg W. Hill and Rob Meyer, “The Role <strong>of</strong> the Chaplain in Information Operations,” The Army Chaplaincy, Summer/Fall 2002, 54-57.<br />
15. JP 1-05, Religious Support in Joint Operations, June 2004, II-3a5. See also FM 1-05, 2003, appendix A, A-1 and A-2.<br />
16. FM 3-13, 1-53.<br />
17. Jonathan Gibbs, “Unit Ministry Teams and Information Operations,” Unpublished Paper, U.S. Army Chaplain Center & School, 10<br />
March 2007.<br />
18. George Adams, “Lessons Learned for Iraq and Afghanistan: Chaplains as Liaisons with Religious Leaders,” Peaceworks, (Washington,<br />
DC: United States Institute <strong>of</strong> Peace, 2006), 1.<br />
19. FM 1-05, A-1.<br />
20. JP 1-05, II-3.<br />
21. FM 1-05, A-2.<br />
22. Gibbs, 2.<br />
23. Adams, 16.<br />
24. Ibid., 17.<br />
25. Ibid., 18.<br />
26. Questionnaire from CH (CPT) Guy McBride, 07 February 2007.<br />
27. Correspondence from CH (CPT) Isaac Opara to CH (LTC) Ken Lawson, 14 February 2007.<br />
Chaplain (LTC) Ken Lawson is currently the Installation Chaplain, Fort Buchanan, Puerto Rico. He joined the Army as a<br />
private in 1979, and entered the Army Chaplain Corps in 1989. He holds a PhD in U.S. History and is a 2007 graduate <strong>of</strong><br />
the U.S. Air Force Air War College.<br />
April - June 2009 31
<strong>Intelligence</strong> Collection in Counterinsurgency<br />
The views expressed in this article are those <strong>of</strong> the author and do not<br />
reflect the <strong>of</strong>ficial policy or position <strong>of</strong> the Departments <strong>of</strong> the Army and<br />
Defense, or the U.S. Government.<br />
Introduction<br />
“Because intelligence and operations are so closely<br />
related, it is important for collectors to be linked to<br />
the operators and analysts they support…collectors<br />
should not passively wait for operators to submit requirements;<br />
rather they should closely monitor the<br />
operational environment and recommend requirements<br />
based on their understanding <strong>of</strong> operators’<br />
needs.” –FM 3-24 Counterinsurgency, 3-129<br />
Many have now written on the necessity for the maneuver<br />
company commander to have an analytical<br />
capability within his formation. The Company<br />
<strong>Intelligence</strong> Support Team (CoIST) or Company<br />
<strong>Intelligence</strong> Cell has already been much discussed,<br />
even within this very publication, and few now disagree<br />
with the concept’s value. However, we must<br />
now begin to take the next step: Empowering the<br />
maneuver company commander not only with increased<br />
analytical capability, but intelligence collection<br />
capability as well.<br />
In a counterinsurgency (COIN), maneuver is the<br />
most important column on the intelligence, surveillance,<br />
and reconnaissance (ISR) collection matrix.<br />
The maneuver company and its platoons are in constant<br />
contact with the local populace everyday, from<br />
planned engagements to traffic control points, even to<br />
local nationals coming to the patrol base. The pulse<br />
<strong>of</strong> the insurgency lies with its ability to influence the<br />
population and that pulse can only be felt with the everyday<br />
contact made at the company level and below.<br />
Thus, the maneuver company commander is forced<br />
to devote an immense amount <strong>of</strong> his time to the collection<br />
and analysis <strong>of</strong> information. 1 Sir Frank Kitson<br />
adds that, “…the system involves a commander in<br />
collecting all the background information he can get<br />
from a variety <strong>of</strong> sources including the intelligence<br />
organization, and analyzing it very carefully in order<br />
to narrow down the possible whereabouts <strong>of</strong> the enemy,<br />
the purpose being to make deductions which<br />
will enable him to employ his men with some hope <strong>of</strong><br />
success as opposed to using them at random in the<br />
hope <strong>of</strong> making a contact.” 2<br />
by Captain David Beall<br />
Besides his own soldiers and perhaps a Raven<br />
Unmanned Aerial System (UAS), the maneuver company<br />
commander has no organic intelligence collection<br />
capability. He is forced to compete with his peers<br />
for assets to assist in his gathering <strong>of</strong> background information.<br />
The first place he looks is naturally to the<br />
battalion, where in practice there are more maneuver<br />
forces, in the form <strong>of</strong> different platoons, and the Human<br />
<strong>Intelligence</strong> (HUMINT) Collection Team (HCT).<br />
The HCT is usually made up <strong>of</strong> three to four<br />
<strong>Military</strong> Occupational Specialty (MOS) 35M HUMINT<br />
Collectors with one serving as the Team Leader.<br />
“The guiding principle to the use <strong>of</strong> HUMINT in<br />
support <strong>of</strong> <strong>of</strong>fensive operations is to minimize the<br />
time between when friendly forces encounter potential<br />
sources (detainees, refugees, and local civilians)<br />
and when a HUMINT collector screens them.” 3<br />
As the name implies, the HCT is taught to operate<br />
as a team, all or most attending every source<br />
meeting, thereby guaranteeing security and source<br />
familiarity with the collectors in case something<br />
should happen to one <strong>of</strong> the collectors (e.g., injury<br />
or Environmental Leave). This proves very frustrating<br />
to the Infantryman; the only time he interacts<br />
with the HCT is when he is tasked to escort them to<br />
source meetings, the information from which may<br />
not even concern his area <strong>of</strong> operations (AO). To<br />
make matters worse, in terrain where weather and<br />
distance hamper timely transportation between<br />
outposts, such as Afghanistan, or heavily IED’d<br />
lines <strong>of</strong> communication restrict regular movement,<br />
such as certain parts <strong>of</strong> Iraq, an HCT’s circulation<br />
to all company AOs is <strong>of</strong>ten severely hobbled.<br />
The Art <strong>of</strong> Locality<br />
“Insurgencies are local…The mosaic nature <strong>of</strong> insurgencies,<br />
coupled with the fact that all Soldiers<br />
and Marines are potential collectors, means that<br />
all echelons both consume and produce intelligence.<br />
This situation results in a bottom-up flow <strong>of</strong><br />
intelligence. This pattern also means that tactical<br />
units at brigade and below require a lot <strong>of</strong> support<br />
32 <strong>Military</strong> <strong>Intelligence</strong>
for both collection and analysis, as their organic intelligence<br />
structure is <strong>of</strong>ten inadequate.” –FM 3-24<br />
Counterinsurgency, 3-5<br />
To most effectively gather and analyze intelligence,<br />
the collector and analyst must become intimately<br />
familiar with the area in which they operate.<br />
Outside intelligence organizations provide products<br />
and analysis that are very useful, particularly for the<br />
objectivism that certain types <strong>of</strong> collection can give.<br />
But the primary source <strong>of</strong> what happens on a dayto-day<br />
basis has to come from those who live in the<br />
area and interact with the populace. 4 The analyst<br />
from afar can never fully appreciate the situation<br />
on the ground, and subsequently his products most<br />
<strong>of</strong>ten lack a focus that the supported unit is driving<br />
at. The same is true <strong>of</strong> the collector from afar and<br />
the collector who comes to visit only occasionally.<br />
This “visiting collector” is the HCT. As previously<br />
mentioned it comes to support when it has source<br />
meetings in companies’ AOs. The HCT will <strong>of</strong> course<br />
do its best to respond to any priority intelligence<br />
requirements (PIRs) <strong>of</strong> the company, but this is difficult<br />
since most company commanders have not<br />
been taught to create their own PIRs. Thus, commanders<br />
are constantly pinging the battalion S2<br />
shop for HUMINT support until they are fed up with<br />
the irregularity.<br />
If the HUMINTers are not local, then they never<br />
learn the mētis they require to be fully successful.<br />
That is, they never completely gain the local<br />
knowledge that is comprised <strong>of</strong> “a wide array<br />
<strong>of</strong> practical skills and acquired intelligence in responding<br />
to a constantly changing natural and human<br />
environment.” 5 If the HUMINTer lives with the<br />
company and constantly goes on patrols to spot and<br />
assess when not in source meetings, then his local<br />
knowledge is that <strong>of</strong> the company, and there is<br />
no loss between the collector and the customer due<br />
to misunderstanding. Furthermore, by developing<br />
mētis, the HUMINTer is a better collector; he understands<br />
the rationality behind the actions <strong>of</strong> those he<br />
aims to influence by living in their context and is also<br />
less susceptible to be taken in by false reporting.<br />
That is not to say HUMINTers do not go out on patrols<br />
with companies when they are placed at the<br />
battalion level. From time to time the HCT visits to<br />
go on missions with the company to see the AO and<br />
spot and assess. The argument however, is that in<br />
the most common configuration (the HCT as a bat-<br />
talion level collection asset), the access that the HCT<br />
has to every company’s AO is limited and generally<br />
is restricted to either whichever AO has more reporting,<br />
or whichever company commander is easier to<br />
work with. For the most part, the HCT is just another<br />
enabler that the commander is trying to juggle<br />
and coordinate for, just another visitor to his AO.<br />
As a visitor, the HUMINTer is only left with his<br />
techne, his understanding <strong>of</strong> his craft as a science,<br />
and lacks contextual insight. An HCT armed with<br />
its craft is powerful, but it is not COIN. COIN is local,<br />
and therefore intelligence collection must be as<br />
well.<br />
The HUMINTers are Part <strong>of</strong> the CoIST<br />
“HUMINT collectors may have to be placed in DS <strong>of</strong><br />
lower echelon combat maneuver forces (battalion<br />
and lower) to support operations. HUMINT and combat<br />
reporting by units in direct contact with threat<br />
forces and local inhabitants becomes the means <strong>of</strong><br />
collection.” –FM 2-22.3 Human <strong>Intelligence</strong> Collector<br />
Operations, 3-16<br />
HUMINTers need to be at the company level.<br />
Clearly, for MOS-specific training, this is impractical,<br />
but for operations it is necessary. The CoIST is,<br />
in effect, the S2 shop for the company; it empowers<br />
the company commander with a staff for information<br />
management and intelligence analysis. The CoIST<br />
pre-briefs and de-briefs patrols; analyzes combat information<br />
to create a company level enemy situation<br />
template; develops threat courses <strong>of</strong> action; targets,<br />
both lethally and non-lethally, at the company<br />
level; serves as a company link to the battalion S2;<br />
and recommends ISR requests and develops recommended<br />
PIR for the company commander.<br />
The HUMINTer is a natural extension <strong>of</strong> this concept,<br />
as he is capable <strong>of</strong> providing much more benefit<br />
than just <strong>Military</strong> Source Operations (MSO). The<br />
35M works in concert with the company commander<br />
and the CoIST team leader to better focus his collection.<br />
He reviews every patrol de-brief to expand his<br />
knowledge <strong>of</strong> the AO and to identify future sources<br />
<strong>of</strong> collection. He helps plan the company’s missions,<br />
sometimes planned around the HUMINTers’ source<br />
meetings. He also runs the company commander’s<br />
informant network; every company commander has<br />
informants, and these are <strong>of</strong>ten mishandled when<br />
the commander tries to illegally task them as if they<br />
were sources. The HUMINTer keeps the commander<br />
‘legal’ by managing who is worthy <strong>of</strong> being a source<br />
April - June 2009 33
and handling them appropriately. Within the CoIST,<br />
he can have a dedicated analyst, which provides<br />
sharper focus to HUMINT operations. 6 But perhaps<br />
most importantly, the HUMINTer goes on the majority<br />
<strong>of</strong> patrols, every planned operation, and attends<br />
every possible local leader engagement, The<br />
HUMINTer is now providing intelligence collection in<br />
support <strong>of</strong> all the lines <strong>of</strong> effort at the company level,<br />
and not solely focusing on security. He develops the<br />
mētis necessary to become a part <strong>of</strong> that company<br />
fight and AO through practice and experience. 7<br />
Despite the HUMINTer becoming part <strong>of</strong> the CoIST,<br />
the 35M reporting channels are unchanged. The<br />
individual HUMINTer still sends his reports to the<br />
HCT team leader, who in turn forwards the reports<br />
to the Operational Management Team. The HCT is<br />
not disbanded, just dispersed. The team leader still<br />
has responsibilities despite the team not operating<br />
as one unit. In addition to reviewing and editing his<br />
team’s reports, he is also responsible for weighting<br />
heavy collection areas or planned operations with<br />
additional HUMINT support. The team leader must<br />
still hold meetings, virtually or telephonically if need<br />
be, with all <strong>of</strong> his HUMINTers to provide mentorship<br />
and ensure information sharing across the battalion’s<br />
AO. He also has to manage, with oversight<br />
from the MI company (MICO), which HUMINTer is<br />
with which company. Certain HUMINTers may not<br />
fit into some companies’ command climates, so the<br />
team must remain flexible to adjust.<br />
The HUMINTer’s interactions with the company<br />
commander, platoon leaders, and other members<br />
<strong>of</strong> the CoIST are as important as his interactions<br />
with the local populace. This fusion <strong>of</strong> the collector,<br />
the analyst, and the consumer at the company and<br />
platoon levels, enables counterinsurgents to execute<br />
operations more effectively, sooner. 8<br />
Iraq<br />
“All actions designed to retain and regain the allegiance<br />
<strong>of</strong> the population are relevant to the process<br />
<strong>of</strong> collecting background information….” –Sir<br />
Frank Kitson, Low Intensity Operations: Subversion,<br />
Insurgency, and Peacekeeping<br />
As the S2 for 3-509th Infantry Battalion (Airborne),<br />
I had a very interesting deployment to Iraq. Before<br />
the deployment began, I set up CoISTs in each <strong>of</strong><br />
our companies. We began the deployment with our<br />
Transfer <strong>of</strong> Authority (TOA) in Iskandariyah, at the<br />
end <strong>of</strong> November <strong>of</strong> 2006. In December we were de-<br />
tached from our brigade and sent to the Marines in<br />
Al Anbar. We returned to Iskandariyah at the end<br />
<strong>of</strong> June 2007, where we served in a Brigade Strike<br />
Force for three months. We then owned battlespace<br />
in Iskandariyah again for the final two months. In<br />
each <strong>of</strong> those moves, the methods available for collecting<br />
intelligence varied greatly. Often the sources<br />
<strong>of</strong> intelligence were extremely undeveloped or not<br />
available at all at the start <strong>of</strong> each new phase <strong>of</strong><br />
the deployment. This fomented the establishment <strong>of</strong><br />
creative methods to maximize collection and generate<br />
substance for the targeting process. Our time in<br />
Garmah, Iraq, a small city and region northeast <strong>of</strong><br />
Fallujah, was a notable example.<br />
We arrived in Garmah in late December 2006, and<br />
took control from an Iraqi Army Brigade(-), who relocated<br />
to Baghdad in support <strong>of</strong> the Surge. There was<br />
no Relief in Place/TOA and no intelligence hand-<strong>of</strong>f.<br />
The Shi’a Iraqi Army had largely alienated the local<br />
Sunni population and had become prisoners in<br />
their own patrol bases due to Al Qaida’s dominance.<br />
The Iraqi Army had burned every HUMINT source<br />
they had. We started from zero.<br />
At first, my HUMINT Team Leader intended to run<br />
operations like he had in Iskandariyah, largely waiting<br />
for walk-ins to come to the forward operating<br />
base (FOB) and requesting to go on missions with<br />
companies when he felt the team had time. However,<br />
one <strong>of</strong> the biggest changes from Iskandariyah to<br />
Garmah was that the companies were now living in<br />
six separate combat outposts, and not on the large<br />
FOB where the Battalion Headquarters was located.<br />
There was no HUMINT reporting.<br />
The continued absence <strong>of</strong> HUMINT reporting was decisive<br />
in persuading the HUMINTers that they needed<br />
to live with the companies or they would never acquire<br />
any sources, nor have any idea what the environment<br />
was like. Once they left, they never came back. The<br />
HCT was divided in order to have at least one collector<br />
per company. Staff Sergeant Ken Del Valle maintained<br />
all <strong>of</strong> his team leader responsibilities, and still provided<br />
constant feedback to the battalion S2 shop.<br />
At first company commanders did not know<br />
how to use 35Ms, but through coaching from the<br />
HUMINTers themselves and the S2 shop, eventually<br />
all <strong>of</strong> the commanders began integrating them into<br />
mission planning. Captain Matt Gregory and his<br />
Able Company, 3-509th IN (ABN), took the greatest<br />
advantage <strong>of</strong> having a HUMINTer at the company<br />
34 <strong>Military</strong> <strong>Intelligence</strong>
level. He quickly recognized the concept’s utility:<br />
“The 35Ms assigned to my company were the biggest<br />
combat multipliers by far.” 9<br />
Able Company accelerated past her sister companies<br />
in the battalion task force due largely to superior<br />
intelligence collection efforts. They focused on gathering<br />
background information on the local area and<br />
populace that either had never been gathered before,<br />
or had been lost. Additionally, CPT Gregory incorporated<br />
SSG Del Valle and the CoIST into his mission<br />
planning process. Able Company began focused patrols<br />
and planned missions where the HUMINTer was<br />
the main effort; “We conducted patrols specifically in<br />
order for SSG Del Valle to engage the local population<br />
in specific areas, and this had a tremendous effect<br />
over time.” 10 By integrating into Able Company,<br />
he began to not only spot and assess on every patrol,<br />
but also gained the local knowledge that he could<br />
not have by simply visiting from Camp Fallujah. CPT<br />
Gregory soon recognized that the HUMINTer could<br />
assist in more than just producing reports, and began<br />
to utilize him in planning his political engagements<br />
and information operations messages.<br />
Another innovator was CPT Stew Lindsay, commander<br />
<strong>of</strong> Charlie Company, 3-509 th IN (ABN) in<br />
North Babil Province, Iraq. Early in CPT Lindsay’s<br />
command, there was no HUMINT support, and he<br />
was forced to run an extensive informant network<br />
in order to gather any intelligence on the ground.<br />
“Local nationals would come and tell me information<br />
all <strong>of</strong> the time, but because I was not a HUMINTer,<br />
I could not put the intelligence into a format that<br />
would allow me to detain someone.” 11 The Iraqis living<br />
in Charlie Company’s AO were frustrated since<br />
they were providing information on Al Qaida, but the<br />
Coalition Forces were unable to arrest the enemy.<br />
Visits from HUMINTers alleviated some <strong>of</strong> the reporting<br />
legitimacy problems, but did not adequately<br />
resolve the issue.<br />
After receiving a dedicated 35M, CPT Lindsay<br />
was able to reorganize his operations to focus on<br />
building the intelligence framework necessary to<br />
support one <strong>of</strong> the most successful company targeting<br />
efforts in the brigade. “I took my HUMINTer<br />
with me everywhere; I took him to Sheik engagements,<br />
Iraqi Security Force meetings, infrastructure<br />
events, raids, you name it…” 12 Additionally, Charlie<br />
Company’s HUMINTer, Sergeant Micah Boor, assumed<br />
CPT Lindsay’s informant network, was able<br />
to apply his craft, and turned most <strong>of</strong> them into<br />
legitimate sources. SGT Boor played an integral<br />
part in the company’s targeting process as Lindsay<br />
adds, “I was focusing on so many different things<br />
as a company commander; having SGT Boor and<br />
the CoIST there to keep all <strong>of</strong> the background information<br />
straight and make realistic lethal, nonlethal,<br />
and ISR targeting recommendations was<br />
tremendous.” 13 Through targeting with SGT Boor,<br />
and later 35M Specialist Wayne Border, Lindsay’s<br />
weekly detainment rate rose 800 percent over a<br />
three month period. 14 Finally, CPT Lindsay established<br />
a Company SOP for operations on the objective<br />
that featured the HUMINTer screening potential<br />
detainees with focused tactical questioning (TQ),<br />
while his CoIST performed tactical site exploitation<br />
(TSE) and started detainment paperwork.<br />
Unfortunately, some company commanders were<br />
less open minded with tactical planning or distrustful<br />
<strong>of</strong> intelligence in general. There was some misuse<br />
at first, until the battalion field grade <strong>of</strong>ficers could<br />
be convinced to correct it. The other companies’ success<br />
with their assigned HUMINTers was more gradual,<br />
but it was nevertheless there. It took more time<br />
for them to learn CPT Gregory’s lesson: “If you put<br />
him [the 35M] at the back <strong>of</strong> the patrol and forget<br />
about him you will get nothing in return, but if you<br />
put him up front and put his talent to work, then<br />
you will get more than you could ever ask for.” 15<br />
Afghanistan<br />
“Yet a man who uses an imaginary map, thinking<br />
that it is a true one, is likely to be worse <strong>of</strong>f than<br />
someone with no map at all; for he will fail to inquire<br />
whenever he can, to observe every detail on his<br />
way, and to search continuously with all his senses<br />
and all his intelligence for indications <strong>of</strong> where he<br />
should go.” –E.F. Schumacher, Small is Beautiful<br />
Following the Iraq deployment <strong>of</strong> 4th Brigade<br />
(Airborne), 25th Infantry Division (Light), I moved<br />
from battalion S2 to MICO Commander, and naturally<br />
sought to incorporate the intelligence lessons<br />
learned into training and operations for the current<br />
deployment to Afghanistan. It is difficult to effect<br />
change in a large organization without the support <strong>of</strong><br />
the chain <strong>of</strong> command. But this turned out not to be<br />
an issue as the new brigade commander also believed<br />
strongly in both the importance <strong>of</strong> the CoIST, and<br />
also the company level placement <strong>of</strong> HUMINTers. He<br />
had drawn the same conclusions from his previous<br />
April - June 2009 35
service in Afghanistan as I had in Iraq. Accordingly,<br />
the CoIST concept was soon implemented in every<br />
maneuver company in the brigade.<br />
The 4/25th ABCT CoIST is comprised <strong>of</strong> six people,<br />
and is uniform throughout the brigade’s maneuver<br />
companies. The only MOS-specific positions<br />
are one MOS 35F <strong>Intelligence</strong> Analyst and one MOS<br />
35M HUMINT Collector. The other positions are<br />
the CoIST Team Leader, the Raven Operator, the<br />
Analyst Assistant, and the HUMINT Assistant, and<br />
are MOS immaterial. Careful training and control<br />
has been placed on the HUMINT Assistant to ensure<br />
that no laws are broken. They cannot conduct MSO,<br />
but rather serve as a dedicated analyst for the 35M<br />
and perform some tasks HUMINTers receive more<br />
in-depth training in, such as TSE/TQ, etc.<br />
There are, <strong>of</strong> course, challenges with the both the<br />
CoIST concept and having HUMINTers at the companies.<br />
The first, as I mentioned in my Iraq experience,<br />
is that most Infantryman do not know what a<br />
HUMINTer can do, and they are subsequently misused.<br />
My First Sergeant and I have played a direct<br />
liaison role with all <strong>of</strong> the maneuver companies; we<br />
sought early in the life cycle to establish positive<br />
working relationships so that we could help them<br />
understand the role <strong>of</strong> intelligence at the company<br />
level and prevent collectors and analysts from being<br />
relegated to radio watch and the like.<br />
Another valid argument is that just as in any unit,<br />
the HUMINT platoon members have a varying level<br />
<strong>of</strong> experience and maturity. One maneuver company<br />
will get a noncommissioned <strong>of</strong>ficer with combat<br />
experience and additional HUMINT schools,<br />
and another will get a HUMINTer straight out <strong>of</strong> initial<br />
entry training. Therefore, the junior 35Ms can<br />
scarcely get the mentorship needed in their craft.<br />
The junior soldiers are also likely to be less confident<br />
in their HUMINT skills and may have difficulty<br />
making solid recommendations to Infantry captains.<br />
We identified these issues in advance and did<br />
our best to match personalities <strong>of</strong> command teams<br />
to HUMINTers, but were confident that these hurdles<br />
were worth it. Leader training was the priority<br />
in pre-deployment, and I stressed that it included<br />
every HUMINTer. There have been some conflicts,<br />
and we have adjusted to the best <strong>of</strong> our ability to<br />
ensure adequate support for all the units.<br />
A third problem was the availability <strong>of</strong> Category-II<br />
Interpreters in order to maintain legality for<br />
HUMINTers conducting MSO. Obtaining all <strong>of</strong> the<br />
interpreters was easier than we anticipated. We<br />
provided detailed justifications for our increased<br />
interpreter requirement to the contracting companies<br />
and, in less than a month, they all arrived.<br />
When we arrived in Afghanistan, we relieved the<br />
previous unit’s “HUMINT map.” 16 Three-fourths<br />
<strong>of</strong> its organic HUMINT collection had been placed<br />
in one battalion’s AO. They were placed there because<br />
that was where the unit believed the majority<br />
<strong>of</strong> collection was to be found. In addition, a few attached<br />
HUMINTers provided coverage in two other<br />
areas. Another reason they never tried to expand<br />
their HUMINT coverage geographically was that they<br />
thought other organizations were already collecting<br />
where their brigade had gaps, so there was no point<br />
to alter the order <strong>of</strong> things. However, the most important<br />
reason why the majority <strong>of</strong> the maneuver companies<br />
rarely saw the HUMINTers was because there<br />
were only four HCTs, and they remained intact.<br />
By focusing on their imaginary HUMINT map, no<br />
one could confirm or deny whether there were more<br />
sources to be had in many <strong>of</strong> the remote areas. Instead<br />
<strong>of</strong> replacing HUMINT one-for-one, we drove on with<br />
our more dispersed CoIST-focused HUMINT lay down.<br />
Our HUMINTers are spread out over fifteen different<br />
locations. They were able to take on the former unit’s<br />
source pool and quickly expand it. In the areas where<br />
there wasn’t supposed to be any reporting, we have acquired<br />
sources. The previous unit failed to confront the<br />
fact that even if there were other organizations running<br />
sources in some areas, those organizations would be<br />
collecting on a different set <strong>of</strong> criteria and responding<br />
to a different chain <strong>of</strong> command’s priorities. The area<br />
that our sources report on has approximately doubled<br />
the previous unit’s network in less than ninety days.<br />
The area covered by our source network also has a<br />
greater correlation to occurrence <strong>of</strong> significant activity<br />
than the previous HUMINT map. However, these are<br />
measures <strong>of</strong> performance, and not effectiveness. The<br />
measures <strong>of</strong> effectiveness will not become evident until<br />
more reflection has been achieved. But, as <strong>of</strong> right now,<br />
it would be fair to say that several <strong>of</strong> the earlier internal<br />
critics have been greatly persuaded, if not won over.<br />
Conclusion<br />
“They said…that he was so devoted to Pure Science<br />
… that he would rather have people die by the<br />
right therapy than be cured by the wrong.” –Sinclair<br />
Lewis, Arrowsmith<br />
36 <strong>Military</strong> <strong>Intelligence</strong>
Afghanistan is not Iraq, anyone who has deployed<br />
to either knows this and is frequently reminded.<br />
However, whether addressing an urban insurgency<br />
or a rural insurgency, “…the HUMINT collectors<br />
must be able to maintain daily contact with the local<br />
population.” 17 The closer a HUMINTer can get<br />
to the population the better. In a bottom-up intelligence<br />
structure, the place <strong>of</strong> the collector is at the<br />
bottom, not mid-way.<br />
There has been much resistance to the changes<br />
that constitute this concept. The majority <strong>of</strong> this resistance<br />
comes not from the collector himself, but<br />
from those with great HUMINT experience in the<br />
pre-9/11 Army. Team centricity is well established<br />
in the HUMINT schoolhouse and amongst its subject<br />
matter experts. But it has been my experience that<br />
when this concept is tried, the hands-on experience<br />
turns some doubters into believers. Just like my<br />
Team Leader in Garmah, who fought against separating<br />
the HCT and living with the companies, once<br />
they go, most don’t look back. Still others remain<br />
entirely obstinate, because it is not taught that way<br />
and involves letting go <strong>of</strong> control. In the end, however,<br />
this concept is really just another manifestation<br />
<strong>of</strong> the HUMINT collector being able to, “operate<br />
with minimal equipment and deploy in all operational<br />
environments in support <strong>of</strong> <strong>of</strong>fensive, defensive,<br />
stability and reconstruction operations, or civil<br />
support operations. Based on solid planning and<br />
preparation, HUMINT collection can provide timely<br />
information if deployed forward in support <strong>of</strong> maneuver<br />
elements.” 18<br />
“There are never enough HUMINT collectors to<br />
meet all requirements.” 19 But this is a maxim true <strong>of</strong><br />
all intelligence, whether collection or analysis, and<br />
doubly so in COIN. The increased intelligence burden<br />
that COIN creates easily exposes the inadequacy<br />
<strong>of</strong> the BCT intelligence modified table <strong>of</strong> equipment.<br />
Low-Level Voice Intercept Teams in every CoIST<br />
would allow Signals <strong>Intelligence</strong> (SIGINT) collection<br />
and tactical intelligence fusion at the company, but<br />
the MICO’s SIGINT manning simply doesn’t support<br />
it. The UAS platoon is designed to only have one aircraft<br />
flying an ISR mission at a time. But, with more<br />
operators and maintainers, it would not be difficult<br />
to sustain aircraft conducting persistent surveillance<br />
on multiple objectives.<br />
There aren’t enough collection assets in the BCT’s<br />
MICO to satisfy the requirements <strong>of</strong> the maneuver<br />
company. This problem is exacerbated even further<br />
by the employment <strong>of</strong> field artillery and brigade special<br />
troops battalions as maneuver formations, as is<br />
common practice in Afghanistan and Iraq today. As<br />
demonstrated earlier in the article, intelligence collection<br />
in a COIN is not “plug and play,” you cannot<br />
train effective intelligence collection systems<br />
while divorced from maneuver. The modular design<br />
<strong>of</strong> the BCT necessitates an intelligence collection system<br />
that is integrated with maneuver during training<br />
and in combat. All <strong>of</strong> these factors place the tactical<br />
company grade MI <strong>of</strong>ficer in the pillory for the lack <strong>of</strong><br />
organic intelligence capability within the BCT. It becomes<br />
his job to “create” more. Training non-MI MOS<br />
soldiers in the crafts <strong>of</strong> some INTs involves plotting an<br />
absurd course between the desires <strong>of</strong> maneuver and<br />
the requirements <strong>of</strong> statutes, both military and nonmilitary.<br />
But that, clearly, is another article.<br />
Endnotes<br />
1. Frank Kitson, Low Intensity Operations: Subversion, Insurgency,<br />
and Peacekeeping (St. Petersburg: Hailer Publishing, 1971), 98-9.<br />
2. Kitson, 97.<br />
3. FM 2-22.3, Human <strong>Intelligence</strong> Collector Operations, September<br />
2006, 3-2.<br />
4. Kitson, 96.<br />
5. James C. Scott, Seeing Like a State: How Certain Schemes to<br />
Improve the Human Condition Have Failed (New Haven: Yale<br />
University Press, 1998), 313.<br />
6. FM 2-22.3, 2-12.<br />
7. Scott, 317.<br />
8. FM 3-24, Counterinsurgency, December 2006, 5-39.<br />
9. Interview with Major Matthew Gregory, USA, FOB Salerno,<br />
Afghanistan, 2 May 2009.<br />
10. Ibid.<br />
11. Interview. Major Stewart Lindsay, USA, FOB Salerno,<br />
Afghanistan, 12 May 2009.<br />
12. Ibid.<br />
13. Ibid.<br />
14. Ibid.<br />
15. Interview, Gregory.<br />
16. This is not intended as criticism <strong>of</strong> the out-going unit. Their<br />
approach was not unreasonable and, in fact, might be considered<br />
normal and customary. Instead, the intent is to document the gains<br />
achieved over the traditional methods <strong>of</strong> HUMINT operations.<br />
17. FM 2-22.3, 3-9.<br />
18. FM 2-22.3, 1-31.<br />
19. FM 2-22.3, 1-32.<br />
Captain David Beall is currently serving as the MICO<br />
Commander for the 4/25 th Airborne BCT in Operation Enduring<br />
Freedom. He also served as the S2 for TF 3-509 th IN (ABN) and<br />
an Armor Platoon Leader in TF 1-16 IN (MECH) during his two<br />
deployments to Operation Iraqi Freedom. He is a graduate <strong>of</strong><br />
the University <strong>of</strong> Montana and an Anna Sobel Levy Fellow.<br />
April - June 2009 37
y George A. Van Otten, PhD<br />
Introduction<br />
The border that separates the U.S. and Mexico runs<br />
for approximately two thousand miles through some<br />
<strong>of</strong> the most challenging and inhospitable terrain in<br />
North America. It is also a place plagued by persistent<br />
violence and crime. Currently, smugglers move<br />
thousands <strong>of</strong> undocumented immigrants and massive<br />
quantities <strong>of</strong> illegal drugs across the border into<br />
the U.S. Moreover, until recently, illegal activities<br />
along the border have steadily increased over the<br />
last several decades.<br />
During the same period <strong>of</strong> time, violence along the<br />
border has become almost endemic thereby forcing<br />
the Mexican government to directly confront the extremely<br />
well financed, well armed, and dangerous<br />
Mexican drug-trafficking organizations <strong>of</strong> northern<br />
Mexico. Smugglers who operate along the border<br />
spread terror by killing police, reporters, <strong>of</strong>ficials,<br />
and members <strong>of</strong> rival organized crime units. 1 In border<br />
cities such as Agua Prieta and Naco, Sonora,<br />
increasingly violent acts against police and other<br />
<strong>of</strong>ficials now make it difficult for Mexico to recruit<br />
people to serve in law enforcement. Since December<br />
<strong>of</strong> 2006, more than 5,000 Mexican citizens (including<br />
many public <strong>of</strong>ficials) have been killed in drugrelated<br />
violence. 2<br />
In addition to the tumult that organized crime<br />
brings to the region, gang members and smugglers<br />
also effectively bribe and intimidate people on both<br />
sides <strong>of</strong> the border. They know how to recruit people<br />
driven by need, as well as those driven by greed.<br />
Mexican drug cartels and criminal gangs have<br />
greatly expanded their operations since the Medellin<br />
and Cali drug cartels in Colombia were curtailed<br />
by the cooperative efforts <strong>of</strong> the governments <strong>of</strong><br />
Colombia and the U.S. In addition to illegal drugs,<br />
these cartels and gangs are also engaged in human<br />
smuggling. 3<br />
Whereas most <strong>American</strong>s worry about the onerous<br />
implications <strong>of</strong> the current situation, people who live<br />
near the border in California, Arizona, New Mexico<br />
and Texas regularly experience first hand the impacts<br />
<strong>of</strong> illegal immigration and drug trafficking.<br />
For many communities in these states, smuggling<br />
strains the capabilities <strong>of</strong> their law enforcement and<br />
emergency response agencies. Furthermore, the recruitment<br />
<strong>of</strong> young men and women by drug cartels<br />
weakens the social fabric <strong>of</strong> <strong>American</strong> towns, cities<br />
and rural counties in the region. Although human<br />
and drug smuggling along the entire reach <strong>of</strong><br />
the border between Mexico and the U.S. is an immense<br />
problem that is, in one way or another, felt<br />
by all <strong>American</strong>s, no community has suffered more<br />
than the residents <strong>of</strong> the Tohono O’odham Nation <strong>of</strong><br />
Southern Arizona.<br />
Arizona<br />
The Tohono O’odham Reservation<br />
38 <strong>Military</strong> <strong>Intelligence</strong><br />
Colorado River<br />
Gila River<br />
Mexico<br />
Gila Bend<br />
Tohono O’odham<br />
Phoenix Salt River<br />
Tohono<br />
O’odham<br />
Reservation<br />
Gila River Reservation<br />
Gila River<br />
Santa Cruz<br />
River<br />
Tucson<br />
San Pedro River<br />
San Xavier<br />
Reservation<br />
N
The southern boundary <strong>of</strong> the Tohono O’odham<br />
(formerly called Papago) Reservation runs for approximately<br />
78 miles along the U.S. border with Mexico.<br />
When the current boundary was established in the<br />
mid-nineteenth century by the Gadsden Treaty between<br />
Mexico and the U.S., no one seemed to notice<br />
that the new border cut through the traditional<br />
homeland <strong>of</strong> the Tohono O’odham (Desert People).<br />
The Desert People generally disregarded the border<br />
and travelled back and forth between Mexico and<br />
the U.S. with few restrictions. Over the last several<br />
decades however, tightened security has made<br />
cross-border travel for the Tohono O’odham increasingly<br />
difficult. For all practical purposes, the<br />
Tohono O’odham who have always wanted to be left<br />
to live in keeping with their traditional ways and<br />
values (Him-dag), are now caught in the middle <strong>of</strong><br />
the ongoing international crisis on the border.<br />
The Tohono O’odham<br />
The Tohono O’odham have occupied the desert region<br />
<strong>of</strong> southern Arizona and northern Sonora for<br />
centuries. Their traditional semi-nomadic, agricultural<br />
lifestyle was intrinsically intertwined with the<br />
summer monsoon rains <strong>of</strong> the desert that brought<br />
their crops to fruition.<br />
Prior to the <strong>of</strong>ficial demarcation <strong>of</strong> the Reservation,<br />
the Tohono O’odham system <strong>of</strong> governance focused<br />
on the family, clan, and village. Traditionally, villages<br />
were led by headmen who settled disputes and<br />
provided guidance. Headmen also protected the sacred<br />
artifacts <strong>of</strong> the village and made certain that<br />
ceremonies followed proper traditions. 4 Throughout<br />
their history, the Tohono O’odham were, and have<br />
remained, a peaceful people dedicated to the preservation<br />
<strong>of</strong> their language, culture and traditions.<br />
Spanish Influence<br />
When the Spanish first arrived in the Santa Cruz<br />
River Valley in the 1680s, they were surprised to<br />
find irrigated fields spreading out for several miles<br />
on both sides <strong>of</strong> the river near the village <strong>of</strong> Bac<br />
(near the site <strong>of</strong> modern-day Tucson). Soon after,<br />
the Spanish priest, Eusebio Kino arrived in the region<br />
and almost immediately initiated the construction<br />
<strong>of</strong> missions in order to convert the indigenous<br />
people to Catholicism. He also sought to establish<br />
European style ranches and mines. Although<br />
he was primarily interested in saving souls, Father<br />
Kino also had a passion for farming and ranching.<br />
He introduced European crops to indigenous farmers<br />
and encouraged them to move into permanent<br />
settlements near the missions.<br />
In the 1700s, the Apache began to raid O’odham<br />
villages. 5 Despite European influences and Apache<br />
raids however, the Tohono O’odham continued to<br />
cling to their traditions. They were nonetheless<br />
changed by these encroachments in that many adopted<br />
the Catholic faith, learned to raise cattle and<br />
European crops, and were forced to develop effective<br />
defenses against those who attacked them. 6<br />
The Tohono O’odham and Mexico<br />
Mexico became independent from Spain in 1821.<br />
By 1828, the Mexican government began closing<br />
Spanish missions throughout the Tohono O’odham<br />
homeland and for the most part, left the Desert<br />
People alone. Even so, many Mexican citizens continued<br />
to establish farms, ranches and mines in areas<br />
traditionally occupied by the Tohono O’odham.<br />
By 1840, such encroachments were becoming serious<br />
enough to cause conflicts between Mexican immigrants<br />
and the Desert People. At one point, the<br />
Tohono O’odham battled with these immigrants<br />
near the Mexican border-town <strong>of</strong> Cobota. 7<br />
The <strong>American</strong>s and the New Border<br />
In 1846, the U.S. and Mexico fought over the location<br />
<strong>of</strong> the international border between the two<br />
nations. In 1848, the Treaty <strong>of</strong> Guadalupe Hidalgo<br />
ended the war, but the exact location <strong>of</strong> the border<br />
was not formalized until 1853 when both nations<br />
signed the Gadsden Treaty. Despite the fact<br />
that the new border cut through the heart <strong>of</strong> the<br />
Tohono O’odham homeland, the U.S. and Mexico<br />
did not include representatives <strong>of</strong> the Desert People<br />
in the negotiations. Moreover, the U.S. did not grant<br />
citizenship to the Tohono O’odham who lived on<br />
the north side <strong>of</strong> the new border. 8 Without citizenship,<br />
and without the protection <strong>of</strong> a formally established<br />
reservation, the O’odham homeland north<br />
<strong>of</strong> the border became part <strong>of</strong> the public domain <strong>of</strong><br />
the U.S., thereby opening these lands to <strong>American</strong><br />
settlers. As non-Indians began to settle on their<br />
land, the Desert People moved further into more<br />
isolated parts <strong>of</strong> their territory. 9 Additionally, the<br />
Desert People and non-Indians disagreed over the<br />
use <strong>of</strong> land and water. To put an end to this tension,<br />
President U.S. Grant created the 71,000 acre San<br />
Xavier Reservation near the city <strong>of</strong> Tucson, Arizona<br />
April - June 2009 39
in 1874. In 1882 the federal government set aside<br />
another 10,000 acres near Gila Bend, Arizona.<br />
Because many <strong>of</strong> the Desert People did not move<br />
to the reservations, they continued to clash with<br />
non-Indians in the area. In 1916, the federal government<br />
responded by setting aside more than two<br />
million acres for the use <strong>of</strong> the Desert People. 10 Over<br />
the next thirty years, it added additional pieces <strong>of</strong><br />
land to the Reservation. It is now the second largest<br />
Native <strong>American</strong> reservation (after the Navajo) in<br />
the U.S. 11<br />
In 1934, in keeping with the Indian Reorganization<br />
Act, the Tohono O’odham established the “Papago<br />
Tribe <strong>of</strong> Arizona.” 12 The creation <strong>of</strong> a centralized<br />
tribal government was a dramatic departure from<br />
the traditionally decentralized, village-based, consensus-oriented<br />
O’odham culture and many tribal<br />
members continued to go to their villages to discuss<br />
problems and ask for decisions. 13<br />
Over the years following the implementation <strong>of</strong><br />
the Indian Reorganization Act, the tribal government<br />
located at Sells, Arizona has increased its<br />
authority over the affairs <strong>of</strong> the Desert People.<br />
Moreover, the Tribal Legislative Council is empowered<br />
by its fiduciary role for federal and tribal<br />
dollars and by the tendency <strong>of</strong> all non-O’odham<br />
to go to the Council to transact business on the<br />
Reservation. Therefore, though many continue to<br />
practice traditional ways, and the O’odham language<br />
is spoken throughout the Reservation, regular<br />
interaction with the dominant society makes<br />
the preservation <strong>of</strong> the traditional culture an increasingly<br />
challenging goal.<br />
The Tohono O’odham Reservation<br />
This is a vast, rugged region <strong>of</strong> exceptional beauty<br />
that encompasses approximately three million acres<br />
immediately north <strong>of</strong> the U.S. border with Mexico.<br />
Despite some urban development near Sells (the<br />
Nation’s capital) and the cultivation <strong>of</strong> thousands<br />
<strong>of</strong> acres by the tribal farm, the lion’s share <strong>of</strong> the<br />
Reservation continues to be characterized by large<br />
tracts <strong>of</strong> natural desert and open range dotted with<br />
small villages and family compounds.<br />
The desert <strong>of</strong> Southern Arizona is characterized<br />
by hot summers with temperatures <strong>of</strong>ten exceeding<br />
100 degrees. Although winters are generally<br />
mild, night time temperatures sometimes drop be-<br />
low freezing. Normally, rainfall is scant, but from<br />
time to time, summer thunder storms result in torrents<br />
<strong>of</strong> water that flood washes and restrict travel.<br />
Natural vegetation on the Reservation is surprisingly<br />
lush and includes a wide variety <strong>of</strong> desert<br />
flora. Reservation wildlife, typical <strong>of</strong> the desert climate,<br />
remains diverse and abundant despite years<br />
<strong>of</strong> cattle ranching. 14<br />
Despite its great beauty, the desert presents major<br />
challenges to those who are unaccustomed to its<br />
extremes. Summer heat, winter cold, long distances<br />
between sources <strong>of</strong> water, poisonous wildlife, wild<br />
animals, rough terrain, and vast areas <strong>of</strong> isolated<br />
country pose serious risks to those who try to travel<br />
over the Reservation on foot.<br />
Crisis on the Border<br />
Until recently, the Desert People were free to<br />
travel back and forth between Mexico and the<br />
Reservation to visit family members and to take part<br />
in ceremonies and celebrations. Recently however,<br />
robust enforcement makes cross-border travel difficult.<br />
Whereas, stronger border security inconveniences<br />
tribal members who travel back and forth<br />
between Mexico and the U.S. legally, thousands<br />
<strong>of</strong> immigrants from Mexico use the isolation <strong>of</strong> the<br />
Reservation to avoid detection to cross illegally into<br />
the U.S. According to the Tohono O’odham Police,<br />
as many as 1,500 people from Mexico pass through<br />
the Reservation every day. 15 Furthermore, since<br />
2000, the U.S. Border Patrol has investigated 1,156<br />
deaths <strong>of</strong> illegal migrants that have occurred on the<br />
Reservation as a result <strong>of</strong> the harsh remoteness <strong>of</strong><br />
the environment. 16 These deaths have placed immense<br />
psychological, social, and financial burdens<br />
on the Desert People.<br />
Over the last decade, there have been several incursions<br />
into the Reservation by people dressed<br />
in Mexican uniforms. In March 1999, Homeland<br />
Security personnel were fired on by personnel wearing<br />
Mexican military uniforms who were smuggling<br />
illegal drugs into the U.S. In April 2000, a cattle<br />
truck drove into the village <strong>of</strong> Menager’s Dam on<br />
the O’odham Reservation carrying men wearing<br />
Mexican military uniforms and armed with machine<br />
guns. In January 2002, two men, dressed as<br />
Mexican soldiers, crashed into a car and killed two<br />
innocent people while smuggling drugs through the<br />
Reservation. Later in May 2002, a Tohono O’odham<br />
40 <strong>Military</strong> <strong>Intelligence</strong>
Nation Ranger was pursued by men wearing Mexican<br />
military uniforms and driving a military vehicle. 17<br />
Impacts <strong>of</strong> Illegal Immigration on the<br />
Reservation<br />
Through no fault <strong>of</strong> their own, the Desert People<br />
are now caught in the middle <strong>of</strong> an immense crisis<br />
created by decisions made long ago and exacerbated<br />
by perceptions <strong>of</strong> wealth and opportunity<br />
in the U.S. relative to the poverty and deprivation<br />
that is <strong>of</strong>ten synonymous with life in Mexico.<br />
Furthermore, illegal immigration and drug smuggling<br />
on the Reservation directly threaten the best<br />
efforts <strong>of</strong> the Tohono O’odham to preserve their traditional<br />
culture and way-<strong>of</strong>-life.<br />
Many illegal immigrants who come from Mexico<br />
to the Reservation arrive in need <strong>of</strong> water, food, and<br />
medical attention. The humanitarian needs <strong>of</strong> these<br />
people cannot be ignored by the Tohono O’odham<br />
who must, by tradition, help others in need. On the<br />
other hand, tribal members do not want to be arrested<br />
for aiding illegal immigrants. Because <strong>of</strong> these<br />
and other similar problems, Tribal Chairman, Ned<br />
Norris, stresses the need for better communications<br />
and consultation between O’odham leaders<br />
and federal <strong>of</strong>ficials. Though cooperation between<br />
the tribal and federal government is evident, and<br />
despite efforts by the U.S. Border Patrol to improve<br />
relations with the O’odham nation, many tribal<br />
members believe the U.S. Department <strong>of</strong> Homeland<br />
Security (DHS) should show greater concern for the<br />
sovereignty <strong>of</strong> the Tohono O’odham Nation. 18<br />
Large numbers <strong>of</strong> illegal immigrants have resulted<br />
in increased levels <strong>of</strong> crime on the Reservation.<br />
During March 2008 alone, an estimated 15,500 illegal<br />
immigrants entered the Reservation. 19 The<br />
Desert People now find it necessary to secure their<br />
homes because immigrants have stolen food, clothing<br />
and other possessions. Sometimes, people<br />
find undocumented immigrants sleeping on their<br />
porches or in outbuildings near their homes. Until<br />
recently, people who lived on the Reservation were<br />
able to walk through the desert without fear. Now<br />
they have found it increasingly necessary to take<br />
personal security measures in order to protect their<br />
families and their possessions.<br />
Although these problems are immense, one <strong>of</strong><br />
the most damaging ramifications <strong>of</strong> human and<br />
drug smuggling on the Reservation is the instant<br />
wealth that smugglers <strong>of</strong>fer to people who have<br />
lived in poverty and deprivation for generations.<br />
The lure <strong>of</strong> tax free dollars in exchange for transportation,<br />
food, water, and shelter has led some<br />
tribal members (especially the young) to participate<br />
in smuggling. Additionally, for humanitarian<br />
reasons, some people have established water<br />
stations along well-travelled routes through the<br />
Reservation. Whereas these stations save lives,<br />
they also draw illegal migrants and smugglers.<br />
Water stations are a contentious issue on the<br />
Reservation, and families are sometimes torn<br />
apart by differences <strong>of</strong> opinion over interaction<br />
with illegal migrants and smugglers.<br />
The Tohono O’odham value privacy and do not<br />
welcome intrusions by outsiders. The smuggling<br />
<strong>of</strong> large numbers <strong>of</strong> people and drugs now brings<br />
hundreds <strong>of</strong> law enforcement personnel to the<br />
Reservation. As Border Patrol agents and employees<br />
<strong>of</strong> other agencies attempt to apprehend undocumented<br />
migrants and drug smugglers, they <strong>of</strong>ten<br />
find it necessary to intrude on the private lives <strong>of</strong><br />
the Desert People. Additionally, most <strong>of</strong> the authorities<br />
who are assigned to work on the Reservation<br />
have not studied the nature <strong>of</strong> O’odham culture,<br />
values, attitudes and beliefs. Sometimes, this lack<br />
<strong>of</strong> knowledge leads to misunderstandings and tense<br />
encounters.<br />
Costs <strong>of</strong> Illegal Immigration<br />
Illegal immigrants leave more than 2,000 tons <strong>of</strong><br />
cast-<strong>of</strong>f bottles, clothing, back packs, and human<br />
waste on the Reservation each year. This trash is<br />
more than merely an eyesore; it is hazardous to<br />
wildlife, domestic animals, and local residents. The<br />
Tohono O’odham Nation now finds it necessary to<br />
spend thousands <strong>of</strong> dollars each year to remove this<br />
garbage. Furthermore, those who live in the small<br />
villages and ranches scattered over the Reservation<br />
are also forced to haul away truck loads <strong>of</strong> garbage<br />
and waste left near their homes. 20<br />
In 2003, the Tohono O’odham Nation spent more<br />
than three million dollars to combat illegal immigration<br />
and smuggling and these costs have continued<br />
to escalate. This, however, is not the only potentially<br />
disastrous ramification <strong>of</strong> illegal immigration and<br />
smuggling. The involvement <strong>of</strong> some tribal members<br />
in these activities seriously complicates the<br />
Nation’s long term commitment to the preservation<br />
<strong>of</strong> the Tohono O’odham culture. Smugglers are will-<br />
April - June 2009 41
ing to pay local people as much as $1,500 per person<br />
to drive illegal immigrants from the Reservation<br />
to the Phoenix metropolitan area. They also pay for<br />
storage, food, water, shelter, and the transportation<br />
<strong>of</strong> illegal narcotics. A person who has access<br />
to a six passenger vehicle could receive more than<br />
$7,000.00 (tax free) for making an eight hour round<br />
trip. For many people who live on the Reservation,<br />
that is a lot <strong>of</strong> money. While no one knows the exact<br />
amount <strong>of</strong> personal income that comes to some<br />
tribal members as a result <strong>of</strong> providing these services,<br />
one study found that the annual total may<br />
exceed $13,795,000. 21<br />
The Desert People live in close-knit communities.<br />
For them, the participation <strong>of</strong> tribal members<br />
in smuggling and other such activities presents<br />
an immense challenge because the Tribal Police<br />
are sometimes called upon to arrest people who<br />
they know very well. Even so, they work closely<br />
with federal, state, and county authorities to enforce<br />
the law and stem the flow <strong>of</strong> illegal migrants<br />
and smuggling on the Reservation. 22<br />
During fiscal year 2002, the Tohono O’odham<br />
Nation was forced to spend nearly $7,000,000 to<br />
deal with the manifestations <strong>of</strong> illegal migration.<br />
During this period, 85 illegal immigrants died on<br />
the Reservation causing $266,050 to be spent on<br />
autopsies and other related costs. At the same<br />
time, Tribal Police dealt with 140 drug smuggling<br />
cases at a cost <strong>of</strong> $642,880; twelve immigrant related<br />
homicides costing $260,000 to investigate;<br />
towed nearly 4,000 abandoned immigrant vehicles<br />
at a cost <strong>of</strong> $180,000, and provided medical<br />
emergency treatment to immigrants at a cost <strong>of</strong><br />
more than $500,000. 23<br />
Although the Tohono O’odham Nation receives<br />
some assistance from the federal government,<br />
the massive numbers <strong>of</strong> illegal entrants to the<br />
Reservation have made it necessary for the Desert<br />
People to divert scarce resources from other pressing<br />
needs including support to schools, economic<br />
development, and infrastructure improvements.<br />
Law Enforcement Issues<br />
While most tribal members want to put an end to<br />
crime on the Reservation, many are uncomfortable<br />
with the presence <strong>of</strong> large numbers <strong>of</strong> non-O’odham<br />
law enforcement personnel in their communities.<br />
Tribal members tell their leaders that some-<br />
times they are inconvenienced, or even harassed<br />
by these personnel. They also point out that many<br />
federal law enforcement <strong>of</strong>ficers and agents seem to<br />
know little about the traditional ways <strong>of</strong> the Desert<br />
People. They call upon the Federal Government and<br />
other governments to respect the sovereignty <strong>of</strong> the<br />
Tohono O’odham Nation. 24<br />
Tribal Chairman, Ned Norris, Jr., in written testimony<br />
to a Joint Subcommittee <strong>of</strong> the U.S. House<br />
<strong>of</strong> Representatives in April 2008, noted that the<br />
Tohono O’odham Nation has worked closely with<br />
the U.S. Customs and Border Protection to find alternatives<br />
to walls along the border. He argues that<br />
viable alternatives include vehicle barriers, towers,<br />
check-points, and camera-radar systems. He believes<br />
that these methods can effectively improve<br />
security without causing the environmental damage<br />
and personal inconveniences associated with<br />
the construction <strong>of</strong> a wall. The Tohono O’odham are<br />
particularly concerned about the impacts <strong>of</strong> a border<br />
wall on migratory wildlife such as the Mexican<br />
jaguar. Chairman Norris now calls upon the federal<br />
government to repeal the authority given to the<br />
Secretary <strong>of</strong> Homeland Security to wave the limitations<br />
<strong>of</strong> the Environmental Protection Act in the interests<br />
<strong>of</strong> security. 25<br />
In recent years, the Border Patrol has sought to expose<br />
agents who patrol on the Reservation to Tohono<br />
O’odham culture. It also employs a community relations<br />
<strong>of</strong>ficer who works closely with tribal members<br />
to insure effective communications. 26 Nevertheless,<br />
the training that most Border Patrol personnel receive<br />
about the culture <strong>of</strong> the Desert People remains<br />
fairly light. Given the complex nature <strong>of</strong> the current<br />
situation, it is clear that law enforcement personnel<br />
assigned to work on the Reservation would benefit<br />
from training designed to immerse them in the traditions,<br />
values, attitudes, and beliefs <strong>of</strong> the Desert<br />
People.<br />
Initiatives to Deal with Illegal<br />
Immigration and Smuggling<br />
Tribal police, as well as federal and state law enforcement<br />
agencies, are making strides in finding<br />
effective ways to stop the flow <strong>of</strong> illegal migrants and<br />
drugs through the Reservation. Among the more<br />
important <strong>of</strong> these initiatives are the employment<br />
<strong>of</strong> Native <strong>American</strong> ‘Shadow Wolf’ trackers, and the<br />
training <strong>of</strong> law enforcement personnel in the gathering,<br />
analysis and use <strong>of</strong> actionable intelligence by<br />
42 <strong>Military</strong> <strong>Intelligence</strong>
the Directorate <strong>of</strong> <strong>Intelligence</strong> Support to Homeland<br />
Security (DISHLS), U.S. Army <strong>Intelligence</strong> Center<br />
(USAIC), at Fort Huachuca, Arizona.<br />
The Shadow Wolves<br />
Although high-tech intelligence and tracking<br />
techniques are employed in order to capture illegal<br />
immigrants and smugglers on the Reservation, the<br />
Shadow Wolves effectively employ low-tech procedures<br />
and techniques. These federal agents are a<br />
Native <strong>American</strong> group <strong>of</strong> interdiction specialists,<br />
who work under U.S. Immigration and Customs<br />
Enforcement (ICE), within the DHS, using their<br />
highly honed tracking skills to find and apprehend<br />
drug smugglers operating on the Reservation.<br />
During the first six months <strong>of</strong> 2007, the Shadow<br />
Wolves seized almost 50,000 pounds <strong>of</strong> marijuana<br />
on the Reservation. In addition to putting their<br />
tracking skills to work, they also train other U.S law<br />
enforcement agents as well as border guards from<br />
other nations including Lithuania, Latvia, Tajikistan,<br />
Uzbekistan, Kazakhstan, and Macedonia. 27<br />
Cultural Awareness and <strong>Intelligence</strong><br />
Training<br />
The ongoing war against terrorism in the Middle<br />
East has brought about increasingly sophisticated<br />
intelligence capabilities, more effective training<br />
strategies and techniques, and an expanding emphasis<br />
on cultural awareness training and education<br />
within the U.S. military. Although the Tohono<br />
O’odham are loyal U.S. citizens, they are strongly<br />
committed to the preservation <strong>of</strong> their culture and<br />
language, and they think <strong>of</strong> the Reservation as a<br />
sacred homeland. Non-O’odham law enforcement<br />
personnel assigned to work on the Reservation<br />
should receive cultural awareness training that is<br />
at least as robust as the training given to members<br />
<strong>of</strong> the U.S. Armed Forces who are stationed in Iraq<br />
and Afghanistan. USAIC has been at the forefront<br />
in the development and delivery <strong>of</strong> cultural awareness<br />
training for the military.<br />
For six years USAIC, through DISHLS, has provided<br />
basic and advanced intelligence training and<br />
education for personnel from a variety <strong>of</strong> agencies<br />
associated with the DHS mission. DISHLS has provided<br />
specialized training via mobile training teams<br />
(MTTs) including courses on terrorism and counterterrorism,<br />
the reporting <strong>of</strong> intelligence data, intelligence<br />
preparation <strong>of</strong> the operational environment,<br />
combating terrorism, interviewing techniques, interrogation,<br />
and effective report writing.<br />
DISHLS has made courses available to U.S. Border<br />
Patrol and other law enforcement agencies in a variety<br />
<strong>of</strong> locations throughout the U.S. and provided<br />
training to personnel attached to the Tucson Sector<br />
<strong>of</strong> the U.S. Border Patrol, charged with protecting<br />
the border from the Eastern Yuma County to the<br />
Arizona/New Mexico boundary.<br />
Tucson Sector<br />
In addition to providing intelligence training<br />
through MTTs, DISHLS is currently striving to supplement<br />
traditional intelligence training with appropriately<br />
designed distributed learning (DL) courses<br />
<strong>of</strong>fered through USAIC’s University <strong>of</strong> <strong>Military</strong><br />
<strong>Intelligence</strong> (UMI). The Directorate is also working<br />
with Cochise College and other institutions <strong>of</strong> higher<br />
learning (including the Tohono O’odham Nation’s<br />
Community College) to gain college credits for many<br />
<strong>of</strong> these courses. Available supplemental courses<br />
include writing and critical thinking. Additionally,<br />
UMI is currently developing DL courses on the importance<br />
<strong>of</strong> culture and intelligence.<br />
It is increasingly evident that securing the nation’s<br />
borders is dependent on the robust collection<br />
<strong>of</strong> information, effective analysis and the insightful<br />
application <strong>of</strong> the resultant intelligence. In order<br />
to do this, all law enforcement personnel who<br />
work along the border (as well as local residents)<br />
should be trained to concisely report observations<br />
that could provide a tactical advantage to tribal<br />
and other <strong>of</strong>ficials charged with bringing smuggling<br />
and illegal immigration on the Reservation<br />
April - June 2009 43
under control. In keeping with this concept, the<br />
DISHLS and UMI are working to provide access to<br />
such training and education to appropriate tribal,<br />
community, county, and federal personnel. This<br />
initiative is designed to increase the cost effectiveness<br />
and timeliness <strong>of</strong> homeland security training<br />
and education, and rests upon the current federal<br />
mandate to all branches <strong>of</strong> government to share<br />
information and resources wherever and whenever<br />
possible.<br />
Securing the Reservation Border<br />
Although there is, as yet, insufficient data available<br />
to definitively state that illegal immigration from<br />
Mexico into the U.S. is in a long term decline, Leslie<br />
Fulbright (San Francisco Chronicle), reported in<br />
October 2008 that the numbers <strong>of</strong> illegal immigrants<br />
have decreased in response to a slowing U.S. economy<br />
and more effective border security measures. 28<br />
Ronald J. Hansen (The Arizona Republic) stated that<br />
illegal immigration in the U.S. has dropped by about<br />
eleven percent over the last year. He attributes this<br />
to the slowing <strong>American</strong> economy and the stepped<br />
up efforts <strong>of</strong> the Border Patrol. 29<br />
Despite these reports however, there has yet to<br />
be a noticeable decline in the social and economic<br />
costs <strong>of</strong> smuggling and illegal immigration on the<br />
Reservation. Tribal, state, and federal personnel<br />
continue to find enforcement <strong>of</strong> the 78 mile Tohono<br />
O’odham border with Mexico a daunting challenge<br />
and continue to seek effective and efficient intelligence<br />
training opportunities through which they<br />
can enhance their abilities to collect, process, and<br />
apply intelligence to their vital homeland security<br />
mission.<br />
Conclusion<br />
The creation <strong>of</strong> the border between Mexico and the<br />
U.S. caused many serious, although not immediately<br />
apparent, problems for the Desert People. In<br />
1853, none who signed the Gadsden Treaty could<br />
have foreseen the wave <strong>of</strong> violence and crime that<br />
now characterizes life on the border. Because they<br />
had nothing to do with creating the border in the<br />
first place, the Tohono O’odham have historically<br />
regarded it with ambivalence. In recent decades<br />
however, drug and human smuggling have made it<br />
necessary for federal <strong>of</strong>ficials, including the Border<br />
Patrol, to critically scrutinize roads and communities<br />
throughout the Reservation.<br />
Although the majority <strong>of</strong> the Desert People support<br />
efforts to stop smuggling and illegal immigration<br />
from Mexico into the U.S. through their vast<br />
Reservation, many are <strong>of</strong>ten disconcerted by constant<br />
interaction with non-O’odham law enforcement<br />
personnel. Differences in values, attitudes,<br />
and beliefs sometimes lead to misunderstandings<br />
that are not conducive to effective cooperation between<br />
local tribal members who may have information<br />
that could help build the intelligence base<br />
needed to secure the border.<br />
Gaining the cooperation <strong>of</strong> the Desert People could<br />
be more easily accomplished if they were convinced<br />
that non-O’odham law enforcement personnel understood,<br />
and showed deference to, O’odham ways<br />
and culture. The successful completion <strong>of</strong> a comprehensive<br />
course on the language, history, traditions,<br />
values, and culture <strong>of</strong> the Desert People by all<br />
non-O’odham tasked with securing the Reservation<br />
border with Mexico would be compelling evidence <strong>of</strong><br />
the desire <strong>of</strong> local, state, and federal governments<br />
to work in respectful partnership with the Tohono<br />
O’odham Nation. Such a course could be developed<br />
and <strong>of</strong>fered (some parts <strong>of</strong> it via DL) through a cooperative<br />
venture between USAIC (DISHLS and UMI)<br />
and the Tohono O’odham Community College.<br />
Many tribal members now view with alarm the<br />
numbers <strong>of</strong> O’odham youth who have been recruited<br />
to work for the drug cartels and smugglers. They<br />
know that unless the current invasion is halted,<br />
the Reservation cannot become a prosperous, safe<br />
hearth <strong>of</strong> traditional O’odham culture. An effective,<br />
well planned long term effort to stop illegal immigration<br />
and drug smuggling on the Reservation is<br />
possible if federal, state, and other authorities fully<br />
cooperate and consult with the Tohono O’odham<br />
Nation.<br />
Though the federal government has a moral obligation<br />
to protect the rights <strong>of</strong> all indigenous groups<br />
in the Nation, shielding the Tohono O’odham from<br />
the disastrous consequences <strong>of</strong> smuggling and illegal<br />
immigration is especially important because the<br />
security <strong>of</strong> the Reservation is increasingly linked<br />
to the security <strong>of</strong> the entire U.S. Actionable intelligence<br />
coupled with high quality applied training<br />
and education can do much to assist the tribal police,<br />
Border Patrol and other law enforcement agencies<br />
as they cooperatively endeavor to secure the<br />
border.<br />
44 <strong>Military</strong> <strong>Intelligence</strong>
Endnotes<br />
1. Michael F. Logan, The Lessening Stream: An Environmental<br />
History <strong>of</strong> the Santa Cruz River (Tucson, Arizona: The University <strong>of</strong><br />
Arizona Press, 2000), 15-181.<br />
2. Chris Hawley, Drug Monitor, “Violence Rises on the US/Mexico<br />
Border,” 14 September 2008, at http://mexicomonitor.blogspot.<br />
com/2008/09/drug-monitor-on-violence-on-usmexico.html.<br />
3. House Committee on Homeland Security, Subcommittee on<br />
Investigations, Michael T. McCaul, Chairman, “A Line in the Sand:<br />
Confronting the Threat at the Southwest Border,” 2007 at http://<br />
www.house.gov/sites/members/tx10_mccaul/pdf/Investigaions-<br />
Border-Report.pdf. and Lee Morgan, The Reaper’s Line: Life<br />
and Death on the Mexican Border (Tucson, Arizona: Rio Nuevo<br />
Publishers, 2006), 54-245.<br />
4. Ruth Underhill, The Papago and Pima Indians <strong>of</strong> Arizona (Palmer<br />
Lake, Colorado: The Filter Press, 1979), 1-57.<br />
5. Logan.<br />
6. J.D. Hendricks, Resistance and Collaboration: O’odham Responses<br />
to U.S. Invasion (Long Beach, California: Tiamat Publications, 2004)<br />
at http://www.tiamatpublications.com/docs/Collaboration_and_<br />
Resistance.pdf.<br />
7. Bernard Fontana, Of Earth and Little Rain (Tucson, Arizona: The<br />
University <strong>of</strong> Arizona Press, 1989), 1-40.<br />
8. In general, <strong>American</strong> Indians were not granted <strong>American</strong><br />
citizenship until the Indian Citizenship Act was enacted in 1924.<br />
9. Hendricks.<br />
10. Hendricks.<br />
11. George Van Otten, “A Development Feasibility Study for San Lucy<br />
District,” Department <strong>of</strong> Geography and Public Planning, Northern<br />
Arizona University, 1-18.<br />
12. The Indian Reorganization Act (Wheeler-Howard Act) <strong>of</strong> 1934<br />
called for Indian Nations to establish home rule or tribal governments.<br />
See http://www.maquah.net/Kafkaesque/statutes/IRA-330.html.<br />
13. Peter Blaine, Sr. with Michael S. Adams, Papagos and Politics<br />
(Tucson, Arizona: The Arizona Historical Society Press, 1981),<br />
67-90.<br />
14. William G. McGinnies, “An Overview <strong>of</strong> the Sonoran Desert, An<br />
Essay,” Developed from a Paper, Second Annual Conference <strong>of</strong> the<br />
Consortium <strong>of</strong> Arid Lands Institutions, 4 February 1976, Tucson,<br />
Arizona at http://alic.aric.arizona.edu/sonoran/documents/<br />
mcginnies/McGinnies_overview.html.<br />
15. John Dougherty, High Country News, “One Nation, Under Fire,”<br />
19 February 2007 at http://www.hcn.org/issues/340/16834.<br />
16. Brady McCombs and Eric Volante, Arizona Daily Star, 9<br />
December 2007, “Deadliest Migrant Trail in U.S. is Right on Tucson’s<br />
Doorstep,” A1-A2.<br />
17. National Congress <strong>of</strong> <strong>American</strong> Indians, The Tohono O’odham<br />
Nation and Homeland Security Report, 2003 at http://www.<br />
ncai.org/ncai/resource/agreements/Tohono%20O’Odham%20<br />
Nation%20Law%20Enforcement%20Materials.pdf<br />
18. McCombs and Volante.<br />
19. Ned Norris, Written Testimony to the Subcommittee on<br />
Fisheries, Wildlife and Oceans and Subcommittee on National<br />
Parks, Forests and Public Lands <strong>of</strong> the House Committee on Natural<br />
Resources: Joint Oversight Hearing, Walls and Waivers: Expedited<br />
Construction <strong>of</strong> the Southern Border Wall and Collateral Impacts to<br />
Communities and the Environment, 28 April 2008 at http://www.<br />
tiamatpublications.com/docs/testimony_norris.pdf.<br />
20. Gary Gross, Union Tribune, “Triple Fence along Border Would<br />
Split Indian Nation,” 22 October 2006 at http://www.signonsandiego.<br />
com/news/nation/20061022-9999-1n22tohono.html.<br />
21. Kenneth D. Madsen, “A Nation Across Nations: The Tohono<br />
O’odham and the U.S. Mexico Border,” unpublished doctoral<br />
dissertation, (Tempe, Arizona: Arizona State University, 2005), 139-<br />
176.<br />
22. Ibid.<br />
23. National Congress <strong>of</strong> <strong>American</strong> Indians and the Tohono O’odham<br />
Nation.<br />
24. Madsen.<br />
25. Norris.<br />
26. Jose A. Gonzalez and Cristina Metheney, U.S. Border Patrol<br />
Agents, Personal telephone interview, 9 December 2007.<br />
27. Sylvia Moreno, The Washington Post, “‘Shadow Wolves’ Prowl the<br />
U.S.–Mexico Border,” 6 May 2007 at http://www.washingtonpost.<br />
com/wp-dyn/content/article/2007/05/05/AR2007050500771_<br />
pf.html.<br />
28. Leslie Fulbright, The San Francisco Chronicle, “Illegal Immigration<br />
Slows as Economy Weakens,” 3 October 2008 at http://www.sfgate.<br />
com/c/a/2008/10/02/BAGU139QIL.DTL.<br />
29. Ronald J. Hansen, Arizonal Republic, “Number <strong>of</strong> Illegal Migrants<br />
in Arizona, U.S. Plummets,” 31 July 2008 at http://www.azcentral.<br />
com/news/articles/2008/07/31/20080731immigration0731.html.<br />
George A. Van Otten, PhD is a retired Lieutenant Colonel,<br />
USAR, and graduate <strong>of</strong> the MI Advanced Course and the<br />
Command and General Staff College. He is a pr<strong>of</strong>essor<br />
emeritus at Northern Arizona University and retired Dean<br />
<strong>of</strong> Training for USAIC. Dr. Van Otten holds a BS and MS<br />
in Education from Western Oregon University and PhD in<br />
Geography from Oregon State University. Currently, he is a<br />
Strategic Planner for CACI, working with USAIC’s UMI and<br />
DISHLS.<br />
April - June 2009 45
BCST: The Army’s Premiere Battle Command Systems Collective Task Trainer<br />
by Major Michael Spears<br />
Day three <strong>of</strong> the MRX in the 1st BCT TOC: The Battle Captain remains focused on the CPOF in front <strong>of</strong> him<br />
as battalion events continue to populate his “BCT Events” effort from simulated, subordinate battalions. The<br />
Fire Support Cell shouts out, “Acquisition! AO Mustangs!” based on the AFATDS display, which immediately<br />
causes the brigade staff to execute its Indirect Fire Battle Drill. In the White Cell room, a “puckster” continues<br />
to provide event injects (events and reports) from his BCST computer into the brigade ABCS network . . .<br />
Introduction<br />
The introduction <strong>of</strong> various complex digital Army Battle Command Systems (ABCS) across the Army over<br />
the past several years has been accompanied by the creation <strong>of</strong> complicated, and <strong>of</strong>ten costly, simulations<br />
programs and specialized applications to stimulate the ABCS boxes. Units required a training capability<br />
to exercise and sustain ABCS skills to ensure user pr<strong>of</strong>iciency and employment <strong>of</strong> the entire ABCS<br />
network. Current simulation programs, such as the Corps Battle Simulation (CBS) and the Joint Combat<br />
and Tactical Simulation (JCATS) serve very useful purposes for major training exercises, but require high<br />
overhead for small unit training purposes. Some <strong>of</strong> this overhead includes external support and extensive<br />
lead time for coordination.<br />
History<br />
As a result <strong>of</strong> unit requests for ABCS stimulation assistance, the National Simulation Center (NSC) initially<br />
developed a low-overhead s<strong>of</strong>tware application, which we know today as the Battle Command Staff<br />
Trainer (BCST). Since its creation, the NSC worked with numerous agencies and program managers to<br />
transition BCST and ensure mutual capability refinement. The Product Director, Common Services, under<br />
direction <strong>of</strong> Program Manager Battle Command, now has responsibility to continue development <strong>of</strong> the<br />
BCST. The U.S. Army Training and Doctrine Command (TRADOC) Capability Manager-Battle Command<br />
(TCM-BC) is responsible for requirements generation and oversight.<br />
Uses<br />
BCST enables units to conduct battle staff training on ABCS command and control systems via internal<br />
resources with minimal setup time and effort and facilitates collective and individual staff training (sustainment<br />
and refresher) for specific sections or entire staffs, from battalion through U.S. Army Service<br />
46 <strong>Military</strong> <strong>Intelligence</strong>
Component Command levels. Significant training opportunities afforded by BCST include: maintain and<br />
improve highly perishable ABCS skills, train new battle staff personnel, apply staff coordination drills, battle<br />
rhythm development and train-up for exercises/events. This s<strong>of</strong>tware also provides an ability to stimulate<br />
the battle staff reactions to friendly and enemy events, as well as planned Master Scenario Events<br />
List (MSEL) injects to initiate staff reactions. BCST should only be used on training networks, never<br />
on real-world operational network. The risk <strong>of</strong> mixed BCST simulated and real-world operational<br />
events is too great!<br />
What BCST is and is Not<br />
BCST is a training program that operates on standard personal computer systems with Micros<strong>of</strong>t<br />
Windows XP and is applicable to both Active and Reserve Component (AC/RC) units, as well as Battle<br />
Command Training Centers (BCTCs). However, this s<strong>of</strong>tware application is not: hardware or computer,<br />
a substitute for ABCS, or a replacement for CBS, JCATS, or other constructive training simulations.<br />
These systems, like BCST, were born <strong>of</strong> necessity and serve a very useful purpose for larger-scale training<br />
exercises.<br />
How Units Receive BCST<br />
Currently, BCST is provided to Army units through unit set fielding (USF) beginning in December<br />
2008 or via the BCST AKO download site. Based on the approved USF schedule for AC/RC/National<br />
Guard units, the s<strong>of</strong>tware fielding and new equipment training (NET) dates are synchronized with<br />
the unit’s input. The computer discs issued during NET include the actual BCST program, as well<br />
as a reference disc that includes training support packages (TSPs) with specific scenarios. Units that<br />
have recently completed USF and ABCS NET may download the BCST program and TSPs from AKO at<br />
https://www.us.army.mil/suite/kc/10244567.*<br />
BCST NET<br />
Prior to BCST NET, units should receive all ABCS equipment and complete NET for those systems.<br />
During BCST NET, select personnel from the S/G-3 and S/G-6 will receive instruction on how to connect<br />
the BCST into the ABCS network, BCST operator training, and exercise scenario skills. Additionally<br />
BCTCs and Centers <strong>of</strong> Excellence will receive the BCST program and NET based on delivery coordination.<br />
A tiered support apparatus will provide support to units for assistance with the BCST program to resolve<br />
identified issues.<br />
Summary<br />
BCST has tremendous training potential for any Army battle staff, especially at brigade and battalion<br />
levels. BCST provides: a flexible training medium to maintain operators’ pr<strong>of</strong>iciency on their respective<br />
systems; flexible training employment, and great resources for quality collective training at<br />
no cost to the unit. Additionally, this capability enhances and complements BCTC supported events<br />
and exercises. The application and references provide a low-overhead training capability package that<br />
commanders, staff sections, or institutions, can use to train on ABCS system-<strong>of</strong>-systems with organic<br />
resources when they choose.<br />
Questions and comments may be directed to: TCM-BC, ATTN: C2 Branch (BCST), 806 Harrison Drive,<br />
Fort Leavenworth, Kansas 66027-2326 or POCs Major Michael Spears at michael.r.spears@us.army.mil,<br />
(913)684-4505 or Mr. Gregory Eddy, at gregory.j.eddy@conus.army.mil, (913) 684-4597 <strong>of</strong> TCM-BC.<br />
Once units have received the s<strong>of</strong>tware, familiarized their units with it, and used it, send suggested improvements<br />
and recommendations for new features to MAJ Spears and/or Mr. Eddy.<br />
Meanwhile, back in the White Cell room, the BCST operator checks his MSEL, and initiates an event<br />
that stimulates the DCGS-A box, as the brigade staff continues to execute their staff coordination and<br />
battle drills . . .<br />
*AKO users will request access to this site from the BCST POCs.<br />
April - June 2009 47
Introduction<br />
One <strong>of</strong> the most important functions during operations<br />
is assessment–determining if the operations<br />
are achieving the tasks and purposes that are intended.<br />
The use <strong>of</strong> three different constructs assist<br />
in assessment: indicators, measures <strong>of</strong> performance,<br />
and measures <strong>of</strong> effectiveness. Understanding these<br />
constructs and their use is critical to determine if<br />
operations are focused on the desired end state.<br />
The purpose for this article is to describe in detail<br />
two <strong>of</strong> these concepts: measures <strong>of</strong> performance<br />
and measures <strong>of</strong> effectiveness. Indicators are an important<br />
construct, but most intelligence pr<strong>of</strong>essionals<br />
are familiar with indicators–items <strong>of</strong> information<br />
that are measurable, collectable, and relevant to<br />
give insight into a measure <strong>of</strong> effectiveness or measure<br />
<strong>of</strong> performance. 1<br />
MOP and MOE Joint Doctrine<br />
Joint Publication (JP) 3-0, Joint Operations and<br />
JP 5-0, Joint Operation Planning provide an explanation<br />
<strong>of</strong> the terms measure <strong>of</strong> performance and<br />
measure <strong>of</strong> effectiveness. The following are the definitions<br />
from JP 5-0:<br />
Measure <strong>of</strong> Performance (MOP): A criterion used<br />
to assess friendly actions that are tied to measuring<br />
task accomplishment.<br />
Measure <strong>of</strong> Effectiveness (MOE): A criterion used<br />
to assess changes in system behavior, capability, or<br />
operational environment that is tied to measuring<br />
the attainment <strong>of</strong> an end state, achievement <strong>of</strong> an<br />
objective, or creation <strong>of</strong> an effect. 2<br />
JP 5-0 also provides an explanatory chart that<br />
provides some clarity to the concepts <strong>of</strong> MOP and<br />
MOE and how they interrelate. 3<br />
by Colonel Jack D. Kem, PhD, U.S. Army, Retired<br />
The views expressed in this article are those <strong>of</strong> the author and do not reflect the <strong>of</strong>ficial policy or position <strong>of</strong> the<br />
Departments <strong>of</strong> the Army and Defense, or the U.S. Government.<br />
Level<br />
National<br />
Strategic<br />
Theater<br />
Strategic<br />
Operational<br />
ASSESSMENT LEVELS AND MEASURES<br />
End State and<br />
Objectives<br />
-End State & Mission<br />
-Objectives<br />
-E�ects<br />
-Tasks<br />
-Mission<br />
-Objectives<br />
-E�ects<br />
-Tasks<br />
-Mission<br />
-Objectives<br />
-Tasks<br />
It is important to note that MOPs relate to the<br />
tasks being performed with the question “Are we<br />
doing things right?” MOEs relate to the effects and<br />
objectives with the question “Are we doing the right<br />
things?” JP 5-0 states that “MOPs are closely associated<br />
with task accomplishment” whereas MOEs<br />
“measure the attainment <strong>of</strong> an end state, achievement<br />
<strong>of</strong> an objective, or creation <strong>of</strong> an effect; they do<br />
not measure task performance.” 4<br />
MOP and MOE–Army Doctrine<br />
Field Manual (FM) 3-0, Operations, provides a similar<br />
explanation <strong>of</strong> the terms MOP and MOE. FM 3-0<br />
states that “measures <strong>of</strong> performance answer the<br />
question, “Was the task or action performed as the<br />
commander intended?” A measure <strong>of</strong> performance<br />
confirms or denies that a task has been properly<br />
performed.” For MOEs, FM 3-0 states “measures <strong>of</strong><br />
effectiveness focus on the results or consequences<br />
<strong>of</strong> actions taken. They answer the question, ‘Is the<br />
force doing the right things, or are additional or<br />
alternative actions required?’ A measure <strong>of</strong> effectiveness<br />
provides a benchmark against which the<br />
48 <strong>Military</strong> <strong>Intelligence</strong><br />
Tactical<br />
Guidance<br />
Assessed using measures <strong>of</strong><br />
e�ectiveness -- MOEs<br />
(Are we doing the right things?)<br />
Assessed using measures <strong>of</strong><br />
performance -- MOPs<br />
(Are we doing the right things?)<br />
Battle Damage<br />
Assessment<br />
Reattack or<br />
Future Targeting<br />
Combat tasks<br />
(particularly �res)<br />
use Combat Assessment<br />
Munitions E�ectiveness<br />
Assessment
commander assesses progress toward accomplishing<br />
the mission.” 5<br />
FM 3-07, Stability Operations, provides a more explicit<br />
definition <strong>of</strong> the concepts <strong>of</strong> MOP and MOE:<br />
MOP: A measure <strong>of</strong> performance is a criterion<br />
used to assess friendly actions that is tied to measuring<br />
task accomplishment (JP 3-0). At the most<br />
basic level, every Soldier assigned a task maintains<br />
a formal or informal checklist to track task completion.<br />
The items on that checklist are measures<br />
<strong>of</strong> performance. At battalion level and above, command<br />
posts monitor measures <strong>of</strong> performance for<br />
assigned tasks. Examples <strong>of</strong> measures <strong>of</strong> performance<br />
include the construction <strong>of</strong> a training facility<br />
for host-nation security forces or an increased border<br />
presence by friendly forces. 6<br />
MOE: A measure <strong>of</strong> effectiveness is a criterion<br />
used to assess changes in system behavior, capability,<br />
or operational environment that is tied to measuring<br />
the attainment <strong>of</strong> an end state, achievement<br />
<strong>of</strong> an objective, or creation <strong>of</strong> an effect (JP 3-0). They<br />
focus on the results or consequences <strong>of</strong> task execution<br />
and provide information that guides decisions<br />
to take additional or alternate actions. Examples <strong>of</strong><br />
measures <strong>of</strong> effectiveness include reduced insurgent<br />
activity, reduced inflation rates, and improvements<br />
in agricultural production. 7<br />
FM 3-07 also provides an excellent description<br />
and example <strong>of</strong> how indicators are used to assess<br />
MOPs and MOEs.<br />
Indicator: An indicator is an item <strong>of</strong> information<br />
that provides insight into a measure <strong>of</strong> effectiveness<br />
or measure <strong>of</strong> performance. Indicators use available<br />
information to inform a specific measure <strong>of</strong> performance<br />
or measure <strong>of</strong> effectiveness. A single indicator<br />
can inform multiple measures <strong>of</strong> performance<br />
and measures <strong>of</strong> effectiveness. Valid indicators are<br />
measurable, collectable, and relevant to a specific<br />
time. Examples <strong>of</strong> indicators include bushels <strong>of</strong> apples<br />
sold in a specific market in the past month,<br />
number <strong>of</strong> escalation <strong>of</strong> force incidents along a given<br />
route in the past 90 days, and number <strong>of</strong> bridges repaired<br />
in a province.<br />
MOP and MOE–Relating the Concepts<br />
One useful way to think <strong>of</strong> MOPs and MOEs is to<br />
think <strong>of</strong> them in terms <strong>of</strong> task and purpose. MOPs<br />
relate to accomplishment <strong>of</strong> the task and MOEs relate<br />
to the accomplishment <strong>of</strong> the purpose. For ex-<br />
ample, a unit may be given the task and purpose <strong>of</strong><br />
occupying a hill in order to provide early warning.<br />
The task <strong>of</strong> occupying the hill expertly executed; the<br />
accomplishment <strong>of</strong> this task provides a MOP. If the<br />
occupation <strong>of</strong> the hill does not provide early warning,<br />
or doesn’t achieve the intended purpose for the<br />
occupation, this is reflected as in a MOE.<br />
Another example is that a unit may be tasked to<br />
conduct at least ten patrols a day in a neighborhood<br />
in order to gain the confidence <strong>of</strong> the local populace.<br />
Even though the unit might conduct the requisite<br />
number <strong>of</strong> patrols to standard, it still may not result<br />
in confidence. From a MOP standpoint, the unit is<br />
successful; from an MOE standpoint, it may not be.<br />
As a result, MOP could easily be considered more<br />
<strong>of</strong> a quantitative measure, while MOE tends to be a<br />
qualitative measure.<br />
The focus for MOP is primarily internal, answering<br />
the question “Are we doing what we are told to<br />
do?” MOE may have an external focus, answering<br />
the question “Do our actions have the effect on others<br />
that we are expecting?<br />
The chart below illustrates a comparison <strong>of</strong> the<br />
concepts <strong>of</strong> MOP and MOE and how they relate to<br />
task and purpose, quantitative vs. qualitative measures,<br />
internal vs. external focus, and the primary<br />
questions to ask for each measure.<br />
Relationship to Task<br />
& Purpose<br />
Quantitative vs.<br />
Qualitative Measures<br />
Internal vs. External<br />
Focus<br />
Primary Question<br />
April - June 2009 49<br />
MOP<br />
Relates directly to Task<br />
Primarily Quantitative<br />
Internal Focus (Task at<br />
hand)<br />
Are we doing things<br />
right? (Are we<br />
accomplishing the task<br />
to standard?)<br />
MOE<br />
Relates directly to Purpose<br />
Primarily Qualitative<br />
External Focus (Impact <strong>of</strong><br />
Actions)<br />
Are we doing the right<br />
things? (Are the things we<br />
are doing getting us to the<br />
end state we want?)<br />
MOP and MOE–Examples from Operations<br />
Using MOP and MOE for assessment does not just<br />
apply to combat operations. The concepts also easily<br />
apply to stability operations and to support to<br />
civil authorities. In stability operations, there may<br />
be a number <strong>of</strong> objectives that easily translate into<br />
MOP and MOE measures. For example, if a line <strong>of</strong><br />
effort in a stability operation is the establishment
<strong>of</strong> the rule <strong>of</strong> law, there will be a number <strong>of</strong> tasks<br />
that are given to units to support the legal system<br />
in a region. The task and purpose for a unit could<br />
be stated in such a way: Establish/fund judicial<br />
training institutes in order to establish civilian trust<br />
in the legitimacy <strong>of</strong> the judiciary system and to further<br />
the establishment <strong>of</strong> the rule <strong>of</strong> law that fosters<br />
the confidence <strong>of</strong> the people in the legal and judicial<br />
systems.<br />
In this case, the MOP and MOE could be:<br />
MOPs: Numbers <strong>of</strong> judicial training institutes<br />
established.<br />
Amount <strong>of</strong> funding contributed for<br />
institutes.<br />
Establishment <strong>of</strong> accreditation agency for<br />
law schools.<br />
MOEs: Increase in public trust in the judiciary<br />
system.<br />
Increase in confidence in the legal and<br />
judicial systems.<br />
Another example from a support to civil authorities<br />
mission could be in support <strong>of</strong> a line <strong>of</strong> effort<br />
for public health and medical services. The task<br />
and purpose for a unit could be stated in such a<br />
way: Re-establish public health and medical services<br />
in order to remove disease threat to save lives,<br />
mitigate human suffering and restore critical services<br />
and to enable the transfer <strong>of</strong> DOD relief operations<br />
to civil authorities.<br />
In this case, the MOP and MOE could be:<br />
MOPs: Number <strong>of</strong> patients treated.<br />
Number <strong>of</strong> hospitals operational.<br />
Number <strong>of</strong> vaccines administered.<br />
MOEs: Decrease in disease threat.<br />
Restoration <strong>of</strong> critical services in the<br />
community.<br />
Increased ability <strong>of</strong> civil authorities to<br />
respond.<br />
In both <strong>of</strong> these cases, the MOPs relate to the<br />
task, are primarily quantitative measures, and are<br />
focused on the internal actions <strong>of</strong> the unit. MOEs,<br />
on the other hand, relate to the purpose, are primarily<br />
qualitative measures, and are focused on the<br />
external effects that result from the unit’s actions.<br />
Conclusion<br />
Understanding how to apply MOPs and MOEs<br />
for assessments is a critical task in both planning<br />
and during operations. JP 3-0 provides the following<br />
summary: Assessment is a process that measures<br />
progress <strong>of</strong> the joint force toward mission<br />
accomplishment. The assessment process begins<br />
during mission analysis when the commander and<br />
staff consider what to measure and how to measure<br />
it to determine progress toward accomplishing<br />
a task, creating an effect, or achieving an<br />
objective. The assessment process uses measures<br />
<strong>of</strong> performance to evaluate task performance at<br />
all levels <strong>of</strong> war and measures <strong>of</strong> effectiveness to<br />
measure effects and determine the progress <strong>of</strong> operations<br />
toward achieving objectives. 8<br />
Selecting appropriate MOPs and MOEs–and relating<br />
them to task and purpose–can ensure that<br />
actions are focused on the desired end state.<br />
Endnotes<br />
1. FM 3-07, Stability Operations, 6 October 2008, 4-69.<br />
2. JP 5-0, Joint Operation Planning, 26 December 2006, III-61.<br />
3. Ibid., III-60.<br />
4. Ibid., III-60 – 61.<br />
5. FM 3-0, Operations, 13 February 2008, 5-86 through 5-87.<br />
6. FM 3-07, 4-67.<br />
7. Ibid., 4-68.<br />
8. JP 3-0, Joint Operations, 17 September 2006, xxi.<br />
Colonel (Retired) Jack D. Kem is a Supervisory Pr<strong>of</strong>essor<br />
in the Department <strong>of</strong> Joint, Interagency, and Multinational<br />
Operations at the U.S. Army Command and General Staff<br />
College, Fort Leavenworth, Kansas. He has served as a<br />
Battalion S2, G2 Plans Officer, DTOC Support Element Chief,<br />
and Battalion XO in the 82d Airborne Division; as a Brigade<br />
S2 in the 3d Infantry Division; as a Company Commander and<br />
Battalion S3 in the 3d Armored Division, and as the Battalion<br />
Commander <strong>of</strong> the 319th MI Battalion, XVIII Airborne Corps.<br />
Colonel Kem graduated from MI Officers’ Advanced Course, the<br />
Army Command and General Staff College, the Air Command<br />
and Staff College, the Joint Forces Staff College, and the<br />
Army War College. He holds a BA from Western Kentucky<br />
University, an MPA from Auburn University at Montgomery,<br />
and a PhD from North Carolina State University. Readers may<br />
contact the author via E-mail at jackie.kem@us.army.mil.<br />
50 <strong>Military</strong> <strong>Intelligence</strong>
trAInInG tHE COrPs<br />
WIT—The Battlefield Commander’s Force<br />
Multiplier in the CIED Fight<br />
Introduction<br />
Weapons <strong>Intelligence</strong> Teams (WITs)<br />
have been a critical asset in the<br />
War on Terrorism and the<br />
counter improvised explosive<br />
device (CIED) fight<br />
since 2004. WITs are consistently<br />
proving their<br />
worth as the battlefield<br />
commander’s resident<br />
technical intelligence expert<br />
and force multiplier.<br />
These teams are filling a<br />
critical gap and providing<br />
timely and actionable intelligence<br />
to the Warfighter.<br />
Their unique skill sets, training,<br />
experience, and equipment<br />
provide commander’s with the capability<br />
to reach out and influence insurgent<br />
networks before they strike against U.S. and<br />
Coalition forces.<br />
We are training these young men and women to<br />
go into harm’s way, to willfully and purposefully expose<br />
themselves to the most dangerous weapon <strong>of</strong><br />
all–an enemy with no regard for human life, an undying<br />
desire to kill us, and the technical means to<br />
succeed at his mission. WITs are helping battlefield<br />
commander’s get at their enemies with unprecedented<br />
success rates. Prosecutions in tribunals and<br />
criminal courts are enjoying much higher conviction<br />
rates thanks in part to evidence and material collected<br />
and exploited by these teams. We are training<br />
and equipping these teams with the singular purpose<br />
<strong>of</strong> defeating this enemy and his weapons “left<br />
<strong>of</strong> the boom,” before he can inflict casualties on us<br />
or our Coalition partners.<br />
In this article I will discuss the history, training,<br />
mission, composition, and future <strong>of</strong> Weapons<br />
<strong>Intelligence</strong> and the teams that conduct it.<br />
by Major Chris Britt<br />
WIT History. A brief look at the history<br />
<strong>of</strong> these teams provides the background<br />
necessary to understand<br />
how they work and why they<br />
are such a critical component<br />
in waging a successful<br />
counterinsurgency (COIN)<br />
campaign. As operations<br />
in Iraq transitioned to<br />
Phase IV, the tactics employed<br />
against Coalition<br />
Forces changed dramatically.<br />
The IED became the<br />
weapon <strong>of</strong> choice against<br />
us and as such “IED” became<br />
a common expression.<br />
Commanders at every level realized<br />
that the IED networks had<br />
to be eliminated. The problem was<br />
that, at that time, there wasn’t an organization<br />
particularly well suited to combat this threat.<br />
As a result, a decision was made that a CIED capability<br />
must be created and fielded as quickly as<br />
possible.<br />
Army leadership at the highest levels took the<br />
lead in the fight against the IED by creating the<br />
Army IED Task Force (TF) in October 2003. It<br />
proved its worth over the following months by reducing<br />
the success rates <strong>of</strong> insurgent IED attacks<br />
despite an overall increase in the total number <strong>of</strong><br />
attacks. In 2004, under the direction <strong>of</strong> Deputy<br />
Secretary <strong>of</strong> Defense Paul D. Wolfowitz, the decision<br />
was made to transform the entity into a Joint<br />
IED TF (JIEDD-TF). In early 2004 JIEDD-TF (now<br />
the Joint IED Defeat Organization (JIEDDO)), the<br />
U.S. Army <strong>Intelligence</strong> and Security Command<br />
(INSCOM), and the Department <strong>of</strong> the Army (DA)<br />
G2 began the process <strong>of</strong> identifying gaps in intelligence<br />
support needed to combat the growing number<br />
<strong>of</strong> insurgent IED networks. The next step was<br />
April - June 2009 51
trAInInG tHE COrPs<br />
to assign responsibilities for the execution <strong>of</strong> training,<br />
equipping, and fielding the resulting teams.<br />
INSCOM tasked the National Ground <strong>Intelligence</strong><br />
Center (NGIC) with developing a workable Concept<br />
<strong>of</strong> Operations to implement a CIED program. NGIC’s<br />
mission analysis led to the recommendation <strong>of</strong> establishing<br />
a Counter IED Targeting Program (CITP).<br />
The CITP would consist <strong>of</strong> three basic cooperating,<br />
but separate, sections: WITs; a forward fusion cell,<br />
and a CONUS based fusion center. The current CITP<br />
mission is to increase the collection <strong>of</strong> technical intelligence<br />
(TECHINT) using WITs and to provide<br />
forward and rear fusion cells producing actionable<br />
intelligence to support the targeting <strong>of</strong> bomb-makers<br />
and their networks.<br />
The first WITs received sixteen days <strong>of</strong> training at<br />
Fort Gordon, Georgia in 2004 and immediately deployed<br />
to Iraq. These initial teams enjoyed limited<br />
success, but more importantly, succeeded in validating<br />
the concept <strong>of</strong> the WIT. Additionally, the teams<br />
were instrumental in getting the word out to battlefield<br />
commanders that they now had a valuable asset<br />
in the CIED fight. The second WIT rotation (Phase<br />
II) was assigned to the 203 rd MI Battalion (TECHINT)<br />
which deployed to Iraq to assume responsibility for<br />
the WIT mission in 2005. Since 2006, WITs have<br />
been made up <strong>of</strong> a combination <strong>of</strong> personnel from<br />
the U.S. Army, Air Force, and Navy.<br />
In June 2006, the U.S. Army <strong>Intelligence</strong> Center<br />
(USAIC) at Fort Huachuca, Arizona was designated<br />
as the proponent for the WIT training mission and<br />
assumed responsibility for the training, development,<br />
and integration <strong>of</strong> weapons technical intelligence<br />
(WTI) in the CIED fight. The first formal Weapons<br />
<strong>Intelligence</strong> course was taught at Fort Huachuca in<br />
September 2008.<br />
WIT Training. WIT training, conducted at the<br />
USAIC, consists <strong>of</strong> fifty-one days <strong>of</strong> instruction divided<br />
between classroom academics, performancebased<br />
practical and laboratory exercises, and a<br />
comprehensive field training exercise. The course<br />
is currently taught three times a year to support<br />
deployment requirements. There are two separate<br />
tracks within the course. The primary track trains<br />
students who will deploy as team members. The secondary<br />
track trains students assigned to the analyst<br />
cell <strong>of</strong> the Weapons <strong>Intelligence</strong> Company (WIC).<br />
All WIT members are trained to the same standard<br />
and every prospective team member must demonstrate<br />
pr<strong>of</strong>iciency in each task before graduating<br />
from the course. Individuals are assigned to a team<br />
upon arrival at the course and in most cases will<br />
train and deploy with that team for the duration <strong>of</strong><br />
their assignment. Team member training content<br />
consists <strong>of</strong> the following broad categories:<br />
Ê Battlefield Forensics: Material collection and preservation;<br />
fingerprint fundamentals and techniques,<br />
and forensic photography.<br />
Ê Media Exploitation/TECHINT Kit: Exploitation <strong>of</strong><br />
captured media and instruction on the use <strong>of</strong> team<br />
equipment.<br />
Ê Weapons <strong>Intelligence</strong>: Scene exploitation; IED<br />
fundamentals; electronics theory; investigation<br />
and questioning, and report writing.<br />
Ê Operational Support Functions: Land navigation;<br />
explosive systems recognition; combat tracker operations;<br />
cultural awareness, and foreign weapons<br />
identification.<br />
52 <strong>Military</strong> <strong>Intelligence</strong>
Training for the analysis cell consists <strong>of</strong> various<br />
intelligence s<strong>of</strong>tware applications; IED fundamentals;<br />
report writing; targeting, and WTI analysis<br />
techniques.<br />
The Weapons <strong>Intelligence</strong> Mission<br />
WITs are small tactical teams that provide WTI<br />
support to Army brigade combat teams (BCTs)<br />
and U.S. Marine Corps regimental combat teams<br />
or other similar elements as required. They are<br />
an intelligence asset that provides both a collection<br />
and an analysis capability at the BCT level.<br />
WITs provide battlefield commanders with a dedicated,<br />
IED related, tactical intelligence collection<br />
and exploitation capability in support <strong>of</strong> targeting<br />
efforts. Commanders may employ WITs at attack<br />
sites (post-blast IED, sniper incidents, etc.) or at<br />
locations where weapons are discovered (pre-blast<br />
IED detected and rendered safe, cache sites, bomb<br />
making facilities, etc.) WITs may also be employed<br />
in other operations such as supporting a raid or<br />
cordon and search by providing in-depth tactical<br />
site exploitation on the objective. As the WIT<br />
concept matures, it becomes more valuable to the<br />
commander. The Weapons <strong>Intelligence</strong> program<br />
was initially focused primarily on the IED threat<br />
but has evolved over the years and is no longer limited<br />
solely to the CIED fight.<br />
Essential tasks and functions include:<br />
ÊÊMove<br />
tactically.<br />
ÊÊConduct<br />
technical collection and exploitation<br />
missions.<br />
ÊÊConduct<br />
media exploitation (including printed<br />
and electronic media.)<br />
ÊÊConduct<br />
WTI analysis.<br />
trAInInG tHE COrPs<br />
ÊÊProduce<br />
intelligence reports and products.<br />
ÊÊCommunicate/disseminate<br />
intelligence to supported<br />
units and higher headquarters.<br />
In addition, WIT provides the following support to<br />
division and higher CIED intelligence efforts:<br />
ÊÊProvide<br />
and inject expert tactical-level reporting<br />
on incident sites into the Theater and<br />
National TECHINT enterprise.<br />
ÊÊPackaging<br />
and delivery <strong>of</strong> evidence/materials<br />
collected at incident sites for more detailed,<br />
higher-level technical exploitation. All material<br />
is collected, tagged, cataloged, transported,<br />
and forwarded according to strict<br />
guidelines that preserve the intelligence and<br />
evidentiary value <strong>of</strong> the materials.<br />
WIT Composition. The Weapons <strong>Intelligence</strong><br />
Company (WIC) deploys in support <strong>of</strong> a Corps or<br />
joint task force (JTF) level headquarters, The current<br />
WIC Headquarters is placed within TF Troy,<br />
supporting the Multi-national Corps-Iraq. It provides<br />
planning and coordination support for the<br />
Corps or JTF staff and exercises technical control<br />
(TECHCON) <strong>of</strong> WTI capabilities (the WI Detachment<br />
and all WITs) supporting the Corps or JTF. The WIC<br />
commander advises the Corps/JTF commander on<br />
task organization, distribution, and employment <strong>of</strong><br />
WTI capabilities, supporting him in the area <strong>of</strong> operations<br />
(AO). The WIC also links the Corps/JTF<br />
commander and staff to the Theater and National<br />
TECHINT enterprise. The company consists <strong>of</strong> up<br />
to fifteen personnel: the WIC commander (0-4); WIC<br />
Executive Officer (0-3); WIC NCOIC (E-9); administrative<br />
specialist (E-6/7); supply specialist (E-6/7);<br />
and eight to ten intelligence analysts (any rank up<br />
to E-7). The analysts receive WIT reports and collected<br />
materials from the teams. They process the<br />
reports, conduct further analysis, and forward intelligence<br />
products to higher headquarters for dissemination<br />
and targeting as required.<br />
The Weapons <strong>Intelligence</strong> Detachment (WID)<br />
deploys to support a division-level headquarters<br />
and normally works directly with the <strong>Intelligence</strong><br />
staff. The WID advises the commander and staff on<br />
task organization, distribution, and employment <strong>of</strong><br />
WTI capability in the division’s AO. It also provides<br />
TECHCON <strong>of</strong> WITs assigned to the division. A critically<br />
important function <strong>of</strong> the WID is to provide<br />
a link for the division’s <strong>Intelligence</strong> staff into the<br />
April - June 2009 53
trAInInG tHE COrPs<br />
Theater and National level TECHINT enterprise. The<br />
WID consists <strong>of</strong> the Detachment Commander (0-3)<br />
and the Detachment NCOIC (E-7).<br />
WITs normally consist <strong>of</strong> five enlisted personnel.<br />
Specific military occupational specialties (MOSs)<br />
may vary between teams but in general have consisted<br />
<strong>of</strong> a combination <strong>of</strong> the following:<br />
Ê The Team Leader is historically a qualified explosive<br />
ordnance disposal (EOD) technician. In<br />
addition to being the Team Leader, he or she<br />
functions as the liaison between the BCT commander<br />
and staff and the WITs higher headquarters.<br />
The Team Leader will also coordinate<br />
with EOD units that provide support in their local<br />
AO.<br />
Ê The senior and junior analysts are <strong>Military</strong><br />
<strong>Intelligence</strong> personnel from the U.S. Army, Air<br />
Force, or Navy. Typically the senior analyst is an<br />
E-5 or E-6 and the junior analyst any rank below<br />
that <strong>of</strong> the senior analyst. There is no specific<br />
<strong>Intelligence</strong> discipline required in order to<br />
be assigned to a team. However, analysts with<br />
strong briefing skills and multi-discipline experience<br />
are preferred and traditionally do better<br />
within the teams.<br />
Ê A combat cameraman or photographer’s mate<br />
brings an in-depth knowledge <strong>of</strong> shot composition,<br />
mid-level photography expertise, and some<br />
limited public affairs experience to the team.<br />
Ê An Army <strong>Military</strong> Police Investigator, Air Force<br />
Office <strong>of</strong> Special Investigations Agent, or a Navy<br />
Master at Arms serves as the team’s law enforcement<br />
expert. They understand crime scene investigation,<br />
evidence preservation, evidentiary<br />
rules and procedures to a greater degree, and<br />
can coordinate with other investigative agencies<br />
when necessary or beneficial to accomplishing<br />
the mission.<br />
Ê The final team member is the combat arms representative.<br />
He contributes to the team by providing<br />
expert tactical analysis <strong>of</strong> incident sites.<br />
The combat arms advisor determines how the<br />
incident was set up and or how the attack was<br />
executed from a tactical point <strong>of</strong> view, records<br />
any changes to enemy tactics, techniques, and<br />
procedures (TTPs), and makes recommendations<br />
on how to counteract any new enemy TTPs.<br />
In order for the team to accomplish its mission,<br />
every member is cross trained in each individual<br />
position. Because every team member has a basic<br />
knowledge and pr<strong>of</strong>iciency in each skill, the Team<br />
Leader is able to divide the team up when necessary.<br />
Team members are expected to train each other on<br />
their unique skill set throughout their tour <strong>of</strong> duty.<br />
Much <strong>of</strong> this training occurs in the forward operating<br />
base between missions. Over the last two years,<br />
many <strong>of</strong> the teams in theater have been required to<br />
conduct split operations in order to support units<br />
within their BCT that are not co-located. Having an<br />
individual team member who can conduct each portion<br />
<strong>of</strong> a successful WIT operation is a definite advantage<br />
to the supported unit.<br />
The Future <strong>of</strong> Weapons <strong>Intelligence</strong><br />
In the summer <strong>of</strong> 2008, the Department <strong>of</strong> Defense<br />
announced that Weapons <strong>Intelligence</strong> would become<br />
an enduring capability, with DA as the Service<br />
proponent. While it’s clear that having teams with<br />
this unique skill set is critical to winning any COIN<br />
fight, there are several issues that still have to be<br />
worked out.<br />
First, WITs don’t technically exist on any unit’s organizational<br />
authorization documents. As a result,<br />
scheduling Soldiers for training, and tracking utilization<br />
<strong>of</strong> the Soldiers trained and equipped to perform<br />
as a WIT is challenging, to say the least. Plans<br />
are underway to create a WIT force structure requirement<br />
at the BCT level which would authorize units<br />
to train Soldiers to fill those positions. Once this requirement<br />
is established, USAIC will be prepared to<br />
conduct periodic classes throughout the year to meet<br />
the requirement for WIT trained Soldiers.<br />
Over the last two years, requests from deploying<br />
units to train their Soldiers have been tremendous.<br />
54 <strong>Military</strong> <strong>Intelligence</strong>
The value <strong>of</strong> an organic WIT capability within the BCT<br />
has finally caught on. At present, there are typically<br />
a few seats in each class that aren’t filled by those<br />
deploying to support one <strong>of</strong> the CIED TFs downrange.<br />
Those seats are <strong>of</strong>fered to deploying units,<br />
the only cost to units is the TDY for their Soldiers. In<br />
the past two years, we have trained teams from the<br />
82 nd Airborne Division, 10 th Mountain Division, 25 th<br />
Infantry Division, 4 th Infantry Division, 1 st Cavalry<br />
Division, and many others.<br />
Secondly, equipment issued to the teams is not<br />
currently in the Army supply system. USAIC is<br />
diligently working to identify equipment requirements<br />
and establish a TECHINT Kit as a program<br />
<strong>of</strong> record so that units can order it as a major enditem<br />
through the standard Army supply system.<br />
Additionally, each component <strong>of</strong> the kit will have its<br />
own national stock number so that it can be easily<br />
replaced. Over the last year we’ve been working<br />
with experts in the fields <strong>of</strong> forensics, law enforcement,<br />
intelligence, and site exploitation (as well as<br />
the associated industries) to assemble a better tool<br />
kit for the teams. The intent was to make the kits<br />
as light and easily transportable as possible while<br />
still equipping the teams with the necessary tools<br />
for the job. Currently, the price <strong>of</strong> each kit has<br />
dropped by almost fifty percent. Keeping cost low<br />
was a huge consideration while designing a kit so<br />
that units could afford it without having to sacrifice<br />
other needed equipment.<br />
Lastly, the WIT does not have assigned MOSs, and<br />
likely will never be assigned them. It does, however,<br />
fit the model for an additional skill identifier (ASI).<br />
USAIC has begun the process for the creation and<br />
trAInInG tHE COrPs<br />
award <strong>of</strong> an ASI to Soldiers trained as WIT members.<br />
Having a WIT ASI will allow the Army to recognize<br />
Soldiers who have graduated from this unique<br />
training, and also allow the Army to assign Soldiers<br />
against WIT coded positions in the future based on<br />
this ASI. With the ASI approved and WIT authorizations<br />
determined for the BCT, it should be a simple<br />
process to assign the right Soldier to the right job.<br />
Conclusion<br />
We are excited about the future <strong>of</strong> the Weapons<br />
<strong>Intelligence</strong> program. Recently completed construction<br />
<strong>of</strong> two specially designed weapons ranges allow<br />
us to conduct live explosives demonstrations<br />
for training purposes. These ranges add realism<br />
to the training and expose students to the realities<br />
<strong>of</strong> IEDs on a practical level. Additionally, we<br />
will teach the next course in a newly renovated<br />
Weapons <strong>Intelligence</strong> Compound separated from<br />
other USAIC instructional facilities. This new compound<br />
will allow us to train all WIT students to a<br />
higher standard in a consolidated and secure atmosphere.<br />
We’ve spent the last eighteen months<br />
updating the training curriculum to ensure it remains<br />
relevant to the CIED fight and WTI needs<br />
<strong>of</strong> the Warfighter. The course is ready to train and<br />
equip the best WITs in the world. Our staff <strong>of</strong> instructors<br />
are dedicated to this mission and united<br />
in providing the most pr<strong>of</strong>essional, realistic, and<br />
relevant training possible.<br />
Major Chris Britt is the Course Manager for the Joint Weapons<br />
<strong>Intelligence</strong> Course. He has served as a Platoon Leader,<br />
Company Executive Officer, Company Commander, Brigade<br />
S6, and ISR Operations Officer.<br />
April - June 2009 55
trAInInG tHE COrPs<br />
01001001001010010010111001010010010100100100101001001001010101010010010010101010100100100101010101001001001010101010010010010101010100100100101010<br />
01010101001001001010010101010010010010100101010100100100101001010101001001001010010101010010010010100101010100100100101001010101001001001010010101<br />
1111101001000100010010000001001001001000100000000000000101001000100100010001000100101000100010101010010010010100100100101001001010010101010101010<br />
01001001001010010010111001010010010100100100101001001001010101010010010010101010100100100101010101001001001010101010010010010101010100100100101010<br />
01010101001001001010010101010010010010100101010100100100101001010101001001001010010101010010010010100101010100100100101001010101001001001010010101<br />
01001001001010010010111001010010010100100100101001001001010101010010010010101010100100100101010101001001001010101010010010010101010100100100101010<br />
01010101001001001010010101010010010010100101010100100100101001010101001001001010010101010010010010100101010100100100101001010101001001001010010101<br />
0001001001001010010000000000000000000111010100101000000000010101110101010010010001001000001000010101010101010000100100101001010001001010001010010<br />
1111101001000100010010000001001001001000100000000000000101001000100100010001000100101000100010101010010010010100100100101001001010010101010101010<br />
01001001001010010010111001010010010100100100101001001001010101010010010010101010100100100101010101001001001010101010010010010101010100100100101010<br />
01010101001001001010010101010010010010100101010100100100101001010101001001001010010101010010010010100101010100100100101001010101001001001010010101<br />
0001001001001010010000000000000000000111010100101000000000010101110101010010010001001000001000010101010101010000100100101001010001001010001010010<br />
The University <strong>of</strong> Arizona<br />
1111101001000100010010000001001001001000100000000000000101001000100100010001000100101000100010101010010010010100100100101001001010010101010101010<br />
Background<br />
How does an organization acquire the skills needed<br />
to develop and conduct training in the high technology<br />
environment <strong>of</strong> today and tomorrow? For some,<br />
the answer may be in contracting or hiring from the<br />
“millennial” generation. While both approaches have<br />
been used successfully at Fort Huachuca, a lesser<br />
known program has been providing Department <strong>of</strong><br />
the Army (DA) civilians these necessary technological<br />
and educational skills for the past ten years.<br />
That program is the “Educational Technology”<br />
plan <strong>of</strong> study <strong>of</strong>fered by the U.S. Army <strong>Intelligence</strong><br />
Center (USAIC) in cooperation with the University <strong>of</strong><br />
Arizona South.<br />
The concept for the program grew from discussions<br />
during 1997-1998 between Dr. Gregory M.<br />
Kreiger, then Dean <strong>of</strong> Continuous Learning, and<br />
Dr. Glenn L. Kjos, Chief <strong>of</strong> the Staff and Faculty<br />
Development Office at the time. Their concern was<br />
that the <strong>Intelligence</strong> Center needed to keep up with<br />
the wave <strong>of</strong> educational technology and, at the same<br />
time, retain the vast experience level <strong>of</strong> the current<br />
work force. The solution they arrived at was to “grow<br />
our own.” They decided, with command support, to<br />
invest in the technological training and education <strong>of</strong><br />
those experienced instructors and training developers<br />
already in the schoolhouse.<br />
Working with Dr. Phil Callahan <strong>of</strong> the University<br />
<strong>of</strong> Arizona South, they came up with a three-year<br />
program <strong>of</strong> study known then as the “Master <strong>of</strong> Arts<br />
in Educational Psychology, Educational Technologies<br />
Emphasis” (today it is simply the “Educational<br />
Technology” program). The curriculum was focused<br />
primarily on the needs <strong>of</strong> the <strong>Intelligence</strong> Center’s<br />
training community, although the program was also<br />
open to members <strong>of</strong> the community.<br />
The Center’s sponsorship <strong>of</strong> the program got<br />
underway in the fall <strong>of</strong> 1998 when 12 DA civil-<br />
by Mr. Richard K. Ward<br />
ians began classes during the evening hours at<br />
the University’s southern campus in Sierra Vista,<br />
Arizona. Sponsorship means that the <strong>Intelligence</strong><br />
Center pays the students’ tuition fees. Students pay<br />
for their books, transportation costs, and incidental<br />
expenses. Sponsored students in the program<br />
usually take two courses per semester for six semesters,<br />
and can, if they stay with it, complete the<br />
program in three years. Courses are conducted in<br />
the evenings and do not conflict with the normal<br />
duty day.<br />
Among the courses taken by the initial students<br />
in the program were: Computer Applications in<br />
Education; Multimedia Applications in Education;<br />
Design <strong>of</strong> Instructional Technologies; Advanced<br />
Design <strong>of</strong> Instructional Technologies; Introduction<br />
to Educational Research; Statistical Methods in<br />
Education; Educational Tests and Measurements;<br />
Learning Theory in Education; Educational<br />
Evaluation, and Theories <strong>of</strong> Human Development.<br />
Program Focus–A Practitioner’s<br />
Approach<br />
The program focused, and still does, on a practitioner’s<br />
approach to the design, development, and<br />
evaluation <strong>of</strong> instructional technology for education<br />
and industry. The program addresses issues related<br />
to learning, instructional design, visual design, multimedia<br />
development, evaluation and research.<br />
What is interesting is the fact that <strong>of</strong> those 12<br />
civilians who started the program in 1998, 10<br />
are still working for the government, and eight <strong>of</strong><br />
those are still at the <strong>Intelligence</strong> Center. The other<br />
two have retired. The government is still getting a<br />
return on its initial investment in the pr<strong>of</strong>essional<br />
development <strong>of</strong> these instructors and training developers<br />
as they apply the technical skills and ed-<br />
56 <strong>Military</strong> <strong>Intelligence</strong>
ucational foundations developed in the program<br />
to their daily work requirements.<br />
At this time, a total <strong>of</strong> 22 DA civilians have taken<br />
advantage <strong>of</strong> this opportunity to enhance their technological<br />
skills and earned a master’s degree in educational<br />
technology as a result. Nineteen are still<br />
government employees. Currently, there are eight<br />
civilians scheduled to continue and/or start the<br />
program in January.<br />
When you ask graduates <strong>of</strong> the program what impact<br />
this opportunity has had on them personally or<br />
in their job performance, their answers reinforce the<br />
original intent <strong>of</strong> the program.<br />
Mr. Leon Leszczynski, an Education Specialist with<br />
the 111 th MI Brigade here at Fort Huachuca, notes<br />
that the program “provided me an opportunity<br />
to ‘retool’ my skills, knowledge, and abilities<br />
to those required by the <strong>Intelligence</strong> Center.”<br />
Further, “this program gave me a solid grasp <strong>of</strong><br />
learning theory and how it relates to instructional<br />
system design and, consequently, I am better able<br />
to advise and assist brigade training developers<br />
and instructors design, develop and implement<br />
the training and training products for which they<br />
are responsible.”<br />
“I highly recommend this program to anyone who<br />
wishes to remain competitive and upwardly mobile<br />
at the <strong>Intelligence</strong> Center. The time and effort<br />
invested in the program pale in comparison with<br />
the dividends enjoyed as a result <strong>of</strong> completing<br />
it,” he adds.<br />
Similar comments come from Mr. Pete Shaver,<br />
Director, MI Foreign Language Training Center, also<br />
a graduate <strong>of</strong> the program. He feels the program<br />
provided him “the capability to design, develop and<br />
evaluate language education programs” and the<br />
“ability to assess their effectiveness.”<br />
Addressing both the personal and pr<strong>of</strong>essional<br />
benefits <strong>of</strong> the program, Mr. Shaver adds, “thanks to<br />
the program, I feel my contribution to the language<br />
community and Fort Huachuca linguists has been<br />
more effective and beneficial.”<br />
Evolving Curriculum<br />
As is the nature <strong>of</strong> educational technology, the<br />
curriculum is constantly evolving to better meet<br />
the technological and educational needs <strong>of</strong> the<br />
<strong>Intelligence</strong> Center and its DA civilians, and remain<br />
relevant. Unlike those first 12 students in the pro-<br />
trAInInG tHE COrPs<br />
gram who received their training in the University’s<br />
traditional classrooms and computer labs, the students<br />
now in the program receive almost all <strong>of</strong> their<br />
training online.<br />
The change to an all online program is reflective<br />
<strong>of</strong> the direction training is taking, and is a major<br />
effort <strong>of</strong> Dr. Betul C. Ozkan, who currently heads<br />
up the Educational Technology Department at the<br />
University <strong>of</strong> Arizona South. Experienced in technology<br />
integration, teacher education, distance learning<br />
environments, educational technology research,<br />
and emerging technologies, she is moving ahead to<br />
make the program relevant to the “millennial” generation<br />
<strong>of</strong> students.<br />
And so, while the core courses in instructional<br />
design and computer applications in education<br />
and training remain, today’s DA civilians in the<br />
program are heavily involved in such courses as<br />
Application <strong>of</strong> Technology in Education; Multimedia<br />
Applications in Education; Introduction to Interface<br />
Design; Designing Online Learning Environments;<br />
Educational Change Through Technology, and<br />
Emerging Technologies in Education. They are engaged<br />
in web based development, authoring tools,<br />
basic programming, scripting, streaming audio and<br />
video, dynamic content determined by server database<br />
values, and many other areas <strong>of</strong> study.<br />
The program is project based with each course requiring<br />
a major development effort by the student.<br />
Students are also expected to complete a comprehensive<br />
best-works portfolio demonstrating competency<br />
within the discipline as a requisite component<br />
for program completion.<br />
Conclusion<br />
The curriculum evolves to meet the ever changing<br />
wave <strong>of</strong> educational technology, but the commitment<br />
remains the same. After 10 years, the <strong>Intelligence</strong><br />
Center is still “growing” their own–investing in the<br />
technological and educational development <strong>of</strong> it’s<br />
civilian training developers and instructors.<br />
Richard K. Ward is an Instructional Systems Specialist in<br />
the Training, Development and Support (TD&S) Directorate,<br />
USAIC, Fort Huachuca, Arizona. He serves as the Chief <strong>of</strong><br />
the Staff & Faculty Development Division (SFDD). Mr. Ward<br />
holds an MA in Education Psychology and Technologies<br />
from the University <strong>of</strong> Arizona. He can be contacted at<br />
rick.ward1@us.army.mil<br />
April - June 2009 57
trAInInG tHE COrPs<br />
Embedded Training: What MI Needs in the Future<br />
Embedded training (ET) is defined as a function<br />
hosted in hardware and/or s<strong>of</strong>tware, integrated into<br />
the overall equipment/system/capability configuration.<br />
With ET the soldier receives information from<br />
the display on the equipment/system and takes action<br />
by making menu selectiond, pushing buttons,<br />
etc. These actions can change the common operating<br />
picture (COP) and the information is transmitted<br />
to other platforms updating the COP in all<br />
the other platforms in a training exercise. As part <strong>of</strong><br />
the normal fielding <strong>of</strong> a new system/equipment New<br />
Equipment Training (NET) is provided to the system<br />
operators and other key personnel.<br />
However NET is usually entry-level training on<br />
“knobology”, the type <strong>of</strong> skills traditionally documented<br />
in user manuals, not “battle-focused” training<br />
that achieves and sustains pr<strong>of</strong>iciency on all<br />
possible Soldier, leader, and collective tasks. The<br />
ET that is required for the future will support commanders<br />
and tactical operations staffs, units, and<br />
soldiers to practice and hone critical warfighting<br />
skills through direct interactions with their warfighting<br />
systems. These systems will incorporate a<br />
full spectrum <strong>of</strong> training support modes as integral<br />
components <strong>of</strong> the system design.<br />
For the <strong>Intelligence</strong> Warfighting Function (IWF)<br />
a system-<strong>of</strong>-systems intelligence training capability<br />
with priority to the operational training domain<br />
(home station, combat training centers, and deployed);<br />
secondarily to the institutional training domain,<br />
and lastly to the self-development training<br />
domain is needed. This ET stimulation training capability<br />
needs to be fielded to the Army to support<br />
tactical <strong>Military</strong> <strong>Intelligence</strong> (MI) units in brigade<br />
combat teams (BCTs) and above. This will enable<br />
realistic battle command training through the high<br />
fidelity simulation, stimulation, and presentation <strong>of</strong><br />
Joint and Army intelligence capabilities. It must be<br />
designed to stimulate the MI collection systems with<br />
scenarios which replicate battlefield situations utilizing<br />
an overarching constructive simulation as the<br />
driver. This will put the MI Soldier in the training<br />
loop using the operational/warfighting equipment<br />
and provide the required reports and data to the<br />
combat commander and his staff.<br />
by Ramona McCaa<br />
This capability, encompassing the latest doctrine<br />
and best practices from the operational force, will<br />
ensure digital training for intelligence systems and<br />
replicate as closely as possible the current and future<br />
<strong>Intelligence</strong> operational environment. The intent<br />
is to concentrate on each applicable individual,<br />
section and/or team’s role and requirement in the<br />
collection, synchronization, integration, production<br />
and dissemination <strong>of</strong> intelligence to support<br />
the commander and drive operations. This capability<br />
relies on actual processors <strong>of</strong> intelligence<br />
to train cross-queuing <strong>of</strong> multi-discipline intelligence<br />
interactions, forcing the production <strong>of</strong> intelligence<br />
products to achieve the needed training for<br />
Commander’s, battle staff and <strong>Intelligence</strong> system<br />
drivers as a cohesive team.<br />
The BCT/Brigade Special Troop Battalion<br />
Commanders, MI company commanders and S2s<br />
will use this ET stimulation/capability to ensure<br />
their organizations and MI soldiers are trained to<br />
support Full Spectrum Operations, and sustain<br />
the low-density MI MOSs training <strong>of</strong> perishable<br />
skills which support the IWF, as an integral part<br />
<strong>of</strong> operations. This sustainment training capability<br />
provides the BCT Commander an accurate evaluation<br />
<strong>of</strong> the IWF capabilities, and accesses the BCT’s<br />
IWF training needs; thereby increasing confidence<br />
in the ability to execute the warfighting mission.<br />
This capability allows the BCT Commander to train<br />
IWF as an essential element <strong>of</strong> Battle Command As<br />
a Weapon System on intelligence collection through<br />
production, integration, and reporting using the very<br />
systems the Soldiers employ. This allows the IWF to<br />
train as it would operate and to develop effective<br />
<strong>Intelligence</strong> Soldiers as appropriate combat multipliers.<br />
This training capability is not exclusive to the<br />
BCT; it also supports training and evaluation <strong>of</strong> the<br />
Battlefield Surveillance Brigade and IEW/ISR system<br />
training at all echelons in a similar manner.<br />
Ramona McCaa served as a Lieutenant Colonel in the U.S.<br />
Army with primary experience in the U.S. Army Acquisition<br />
Corps. She is currently a contractor with the New Systems<br />
and Training Integration Office at Fort Huachuca, Arizona<br />
where she serves as the Deputy Operations Group Chief. She<br />
may be contacted at (520) 533-2590.<br />
58 <strong>Military</strong> <strong>Intelligence</strong>
March 29, 2009, White Sands Missile Range, New Mexico.<br />
Photos by Sergeant Austin Thomas<br />
More than 5,300 participants from 50 states and eight countries,<br />
including the Philippines, Germany, Canada and the<br />
United Kingdom came together for the 20th Annual Bataan<br />
Memorial Death March.<br />
Paul Kerchum <strong>of</strong> Benson, Arizona, a Bataan survivor, who<br />
served with B Co, 31 st Infantry Battalion, had this to say,<br />
“10,000 men died on that hot, dusty road. They were shot,<br />
bayoneted, beheaded, or beaten to death for no reason<br />
whatsoever, . . . I think <strong>of</strong> that limerick composed by an<br />
anonymous member <strong>of</strong> the 31 st Infantry on Bataan:<br />
We are the battling bastards <strong>of</strong> Bataan,<br />
No mama, no poppa, no Uncle Sam.<br />
No aunts, no uncles, no nephews or nieces,<br />
No guns, no ammunition, no artillery pieces,<br />
And nobody gives a damn!”<br />
Team Hell Hounds, HHC, USAIC, Fort Huachuca, Arizona<br />
from left to right: SPC Zachary Taylor, SSG Charles Dybo,<br />
SFC David Schreiner, SGT Austin Thomas, and SSG RJ<br />
Niesen.<br />
Everyone who participated had their individual reasons for<br />
being there, but all came to honor the Soldiers, Marines,<br />
Airmen, and Sailors who sacrificed their lives. <strong>Military</strong> and<br />
civilian, young and old marched, ran and rucked side by side<br />
across the rough terrain.<br />
April - June 2009 59
Buffalo<br />
Soldier dedication<br />
Story and photo by Garlan Martens<br />
(From left) Joan Way, president <strong>of</strong> the Southwest Association <strong>of</strong> Buffalo<br />
This article originally appeared in the Fort Soldiers, the Honorable Ronald James, assistant secretary <strong>of</strong> the Army<br />
Huachuca Scout, 30 April 2009, and is reprinted (Manpower and Reserve Affairs) and MG John Custer unveil the plaque at the<br />
with permission.<br />
dedication ceremony <strong>of</strong> the Buffalo Soldier Legacy Plaza, Friday.<br />
For more than 50 years, black men from around the United States called Fort Huachuca home and became<br />
known as Buffalo Soldiers. On April 23, their contributions to the Army and the Southwest were recognized<br />
at the dedication ceremony <strong>of</strong> the Buffalo Soldier Legacy Plaza.<br />
The plaza, located across from the traffic circle in what is known as Old Post, is also the new location<br />
for the Buffalo Soldier statue that stood by the main gate for many years. The statue, first dedicated over<br />
30 years ago to mark Fort Huachuca’s 100th anniversary, was moved when Major General Barbara Fast,<br />
a former post commander, formalized the idea for the plaza and Legacy Trail. The walking trail begins at<br />
the plaza and takes visitors through Old Post stopping at many historical sites such as the Fort Huachuca<br />
Museum.<br />
The legacy <strong>of</strong> the Buffalo Soldier is one dating back to 1866 when Congress passed legislation approving<br />
the formation <strong>of</strong> six Army regiments which included the 9th and 10th Cavalry. The 24th and 25th Infantry<br />
were formed separately several years later, and conducted missions around the West. Beginning in 1892,<br />
all four <strong>of</strong> the units were permanently located at the remote Army post in Southeast Arizona and remained<br />
there for years to come. Major General John Custer reminded all in attendance that, although many other<br />
Army installations claim they are the home <strong>of</strong> the Buffalo Soldiers, Fort Huachuca is the true home <strong>of</strong> the<br />
black soldiers.<br />
“We should all hold that very dear,” he added. The guest speaker for the dedication was the Honorable<br />
Ronald James, the assistant secretary <strong>of</strong> the Army (Manpower and Reserve Affairs). James, also a retired<br />
Army Officer, spoke <strong>of</strong> the long history black Soldiers have made in the military, not only the Buffalo<br />
Soldiers, but others dating back to the Civil War. His remarks centered on people such as his great grandfather,<br />
Alexander Hogan, who was born into slavery and entered the military later in life. He added that<br />
many such as his great grandfather made the ultimate sacrifice for a divided nation not fully appreciative<br />
<strong>of</strong> their service and dedication. James also spoke about how the plaza would be a lasting tribute to all<br />
black Soldiers and the steps they made to make a difference in the Armed services.<br />
The dedication concluded with James, Custer, Colonel Melissa Sturgeon (Fort Huachuca garrison commander),<br />
Joan Way, representing the Southwest Buffalo Soldier Association ,and Ron Eppich <strong>of</strong> the Old<br />
Guard Riders, unveiling the plaque in front <strong>of</strong> the Buffalo Soldier statue and then raising the red and white<br />
Buffalo Soldier Cavalry Guidon.<br />
60 <strong>Military</strong> <strong>Intelligence</strong>
The 22 nd Annual <strong>Military</strong> <strong>Intelligence</strong> (MI) Corps Hall <strong>of</strong> Fame Induction Ceremony was held at Fort<br />
Huachuca on 26 June 2008. Including this year’s seven inductees, only 217 MI pr<strong>of</strong>essionals have been<br />
selected for membership into the Hall <strong>of</strong> Fame. The selection process is deliberate and thorough. Each<br />
nomination is judged by a board <strong>of</strong> active and retired senior <strong>of</strong>ficers, noncommissioned <strong>of</strong>ficers, and pr<strong>of</strong>essional<br />
MI civilians.<br />
The 2009 inductees are: Major General Robert A. Harding (U.S. Army, Retired); Major General William<br />
E. Harmon (U.S. Army, Retired); Brigadier General Roy M. Strom (U.S. Army, Retired); Chief Warrant<br />
Officer Five Wallace S. Price (U.S. Army, Retired); Chief Warrant Officer Three Doris I. Allen (U.S. Army,<br />
Retired); Command Sergeant Major Odell Williams (U.S. Army, Retired, Deceased); and Command<br />
Sergeant Major Ronald D. Wright (U.S. Army, Retired)<br />
Major General Robert A. Harding, (U.S. Army, Retired)<br />
Major General Robert A. Harding is a native <strong>of</strong> New York City (NYC). He was commissioned as<br />
a second lieutenant from the Officer Candidate School, Fort Belvoir, Virginia, in April 1969. From<br />
September 1969 to April 1971, then Second Lieutenant Harding conducted Counterintelligence (CI) investigations<br />
and operations with the 108 th MI Group in NYC. He left New York to command the Inchon<br />
and Uijongbu Field Offices in Korea. He concluded<br />
his initial assignment for the 501 st MI Group in<br />
May 1972. Captain Harding then assumed command<br />
<strong>of</strong> Headquarters Company, 1 st MI Battalion<br />
at Fort Bragg, North Carolina.<br />
In early 1975, CPT Harding was assigned to the<br />
Defense <strong>Intelligence</strong> Agency (DIA) in the Pentagon<br />
as the strategic analyst for Korea, where he served<br />
until October 1978. Following this assignment,<br />
he served first as the S2 <strong>of</strong> the 1 st Battalion, 59 th<br />
Air Defense Artillery, 8 th Mechanized Infantry<br />
Division, and then as the S2 for the 1 st Brigade, 8 th<br />
Mechanized Infantry Division. While serving as the<br />
Brigade <strong>Intelligence</strong> Officer, CPT Harding was promoted<br />
to the rank <strong>of</strong> Major. Returning stateside,<br />
he was assigned as the <strong>Pr<strong>of</strong>essional</strong> Development<br />
Officer, U.S. Army <strong>Military</strong> Personnel Center,<br />
Alexandria, Virginia. Approximately two years later,<br />
he would report as a student to the Armed Forces<br />
Staff College in Norfolk, Virginia. Upon his graduation<br />
in June 1983, MAJ Harding assumed the duties<br />
as the Executive Officer, Army CI Directorate<br />
in the Pentagon. In October 1985, he moved to the<br />
April - June 2009 61
position <strong>of</strong> Assistant to the Director <strong>of</strong> the Army Staff, where he served for almost three years, and during<br />
which he was promoted to Lieutenant Colonel.<br />
LTC Harding then assumed command <strong>of</strong> the 524 th MI Battalion, Eighth U.S. Army, Korea. Returning<br />
from Korea in July 1990, he attended the U.S. Naval War College in Newport, Rhode Island. From July<br />
1991 to June 1992, he served as the Assistant Deputy Chief <strong>of</strong> Staff for Operations and Plans, U.S. Army<br />
<strong>Intelligence</strong> and Security Command (INSCOM), Fort Belvoir, Virginia, and was promoted to the rank <strong>of</strong><br />
Colonel. Following his promotion, COL Harding commanded <strong>of</strong> the 902 nd MI Group (CI) at Fort Meade,<br />
Maryland, for two years. After leaving this post, he was assigned to the Pentagon as the Executive Officer<br />
to the Deputy Chief <strong>of</strong> Staff for <strong>Intelligence</strong>, U.S. Army.<br />
In September 1995, he reported to Quarry Heights, Panama, to serve as the Director <strong>of</strong> <strong>Intelligence</strong> (J2)<br />
for the U.S. Southern Command, where he was responsible for directing and managing daily collection and<br />
reporting activities. He planned and executed intelligence support to military operations, including contingency<br />
planning and crisis actions. During his tenure as the J2, COL Harding was promoted to the rank<br />
<strong>of</strong> Brigadier General in July 1996. Upon completing his duties in Panama, BG Harding returned to DIA to<br />
serve as the Director <strong>of</strong> Operations from December 1996 to March 2000. While serving as the Director <strong>of</strong><br />
Operations, he was promoted to Major General in October 1999. MG Harding’s final assignment in uniform<br />
was as Deputy G2, U.S. Army, in Washington, D.C. He concluded his distinguished Army intelligence<br />
career <strong>of</strong> 33 years when he retired in August 2001.<br />
Major General Harding’s awards and decorations include the Defense Distinguished Service Medal, the<br />
Army Distinguished Service Medal, the Defense Superior Service Medal, the Legion <strong>of</strong> Merit (3 OLCs), the<br />
Defense Meritorious Service Medal, the Army Meritorious Service Medal (2 OLCs), and the Army Staff<br />
Identification Badge.<br />
Major General William E. Harmon, (U.S. Army, Retired)<br />
Major General William E. Harmon was commissioned as a second lieutenant in the Infantry in the summer<br />
<strong>of</strong> 1960 and reported for the Infantry Officer Basic Course at Fort Benning, Georgia in August 1960.<br />
His first assignment was as an Infantry Platoon Leader with D Company, 2 nd Airborne Battle Group, 187 th<br />
Infantry at Fort Campbell, Kentucky where he served nearly two years as a Platoon Leader and Company<br />
Executive Officer. In 1962 Lieutenant Harmon was<br />
detailed from Infantry to Army <strong>Intelligence</strong>, before<br />
MI became an active duty branch. He received training<br />
at the <strong>Intelligence</strong> Research Officer Course, U.S.<br />
Army <strong>Intelligence</strong> School at Fort Holabird, Maryland.<br />
While there, he transferred to the newly formed active<br />
duty Army <strong>Intelligence</strong> and Security Branch,<br />
and remained in MI until his retirement thirty two<br />
later.<br />
His first MI field assignment was in 1963 as a<br />
CI Officer, 201 st MI Detachment, I Corps Group<br />
Headquarters, Uijongbu, Korea. In February 1964,<br />
he served as the G2 Security and Automation<br />
Officer, while assigned to the 11 th MI Detachment,<br />
11 th Air Assault Division at Fort Benning, during the<br />
Army field testing <strong>of</strong> the air assault concept. Moving<br />
to Fort Bragg in December 1964, CPT Harmon assumed<br />
the duties as Chief, Current <strong>Intelligence</strong><br />
Branch, G2, U.S. Army Kennedy Center for Special<br />
Warfare. In September 1965, he reported as a Plans<br />
Officer, S3, 519 th MI Battalion to help plan and ex-<br />
62 <strong>Military</strong> <strong>Intelligence</strong>
ecute the movement <strong>of</strong> the 525 th MI Group to Vietnam. Once in Vietnam he was attached to the 5 th Special<br />
Forces Group (VN) as the CI Officer for Detachment C-5 (Project Horse). CPT Harmon then returned to Fort<br />
Holabird to attend the MI Officer Advanced Course. Following the course he was assigned to the Office <strong>of</strong><br />
the G2, U.S. Army Pacific, Fort Shafter, Hawaii with duty on the Korea Desk for a brief period; then was<br />
reassigned to the Vietnam Desk following the Tet Offensive.<br />
Major Harmon would return to Vietnam and serve on the III Corps Desk, J2, U.S. <strong>Military</strong> Assistance<br />
Command Vietnam (MACV). In August 1969 he attended the U.S. Army Command and General Staff<br />
College before reporting to London, England to become a Desk Officer studying the Soviet Army on the<br />
British <strong>Intelligence</strong> Staff. After three years in England, MAJ Harmon assumed command <strong>of</strong> the 203 rd<br />
MI Detachment, III Corps at Fort Hood, Texas. Following command, in March 1976 he became the G2,<br />
2 nd Armored Division. In May <strong>of</strong> 1977, Lieutenant Colonel Harmon assumed command <strong>of</strong> the 522 nd MI<br />
Battalion (CEWI), 2 nd Armored Division at Fort Hood. Following battalion command, he attended the U.S.<br />
Army War College, Carlisle Barracks, Pennsylvania.<br />
Upon graduating from the War College, Colonel Harmon assumed the duties as the Director, Signals<br />
<strong>Intelligence</strong> (SIGINT) Division, <strong>Intelligence</strong> Systems Directorate, Office <strong>of</strong> the Assistant Chief <strong>of</strong> Staff for<br />
<strong>Intelligence</strong>, U.S. Army. For one year he would serve in the Pentagon before returning in July 1980 to Fort<br />
Bragg to become the XVIII Airborne Corps Deputy G2. In January 1981, COL Harmon assumed command<br />
<strong>of</strong> the 525 th MI Group (CEWI), XVIII Airborne Corps. He would command the Group for two and half years.<br />
In June <strong>of</strong> 1983, he became the Director, <strong>Intelligence</strong> Systems Directorate, Office <strong>of</strong> the Assistant Chief <strong>of</strong><br />
Staff for <strong>Intelligence</strong>, U.S. Army.<br />
In November <strong>of</strong> 1984 until 1990, Brigadier General Harmon was the Program Manager, Joint Tactical<br />
Fusion Program Management Office, Office <strong>of</strong> the Deputy Chief <strong>of</strong> Staff for Operations and Plans, U.S.<br />
Army, Washington, D.C. His final assignment was as the Program Executive Officer for Command and<br />
Control Systems, Fort Monmouth, New Jersey. He retired in 1992 after a distinguished career spanning<br />
32 years.<br />
Major General Harmon’s awards and badges include<br />
the Distinguished Service Medal, Legion <strong>of</strong><br />
Merit, Bronze Star Medal (2 OLCs), Meritorious<br />
Service Medal (1 OLC), Joint Service Commendation<br />
Medal, Army Commendation Medal, Master<br />
Parachutist Badge, Ranger Tab and the Army Staff<br />
Identification Medal.<br />
Brigadier General Roy M. Strom, (U.S.<br />
Army, Retired)<br />
Brigadier General Roy M. Strom was commissioned<br />
as a second lieutenant in Artillery in 1954<br />
and reported to Artillery Officer Basic Course at Fort<br />
Bliss, Texas. His first assignment would be as a second<br />
lieutenant serving as a Platoon Leader, 764 th<br />
Anti-Aircraft Artillery, 90/120 mm Gun Battalion at<br />
Fort Clayton, Panama, Canal Zone. He also commanded<br />
the Caribbean Command Honor Guard<br />
Company to honor dignitaries during their visits<br />
to the Canal Zone. Returning to the U.S., he attended<br />
Gunnery School, Fort Sill, Oklahoma, then<br />
the Airborne School at Fort Benning. In November<br />
<strong>of</strong> 1959, Captain Strom reported to Columbus, Ohio<br />
where he would assume the duties as an <strong>Intelligence</strong><br />
April - June 2009 63
Officer, Columbus Field Office, 109 th CI Corps Group. Serving for approximately two and one half years,<br />
he departed Ohio in January 1962 and transferred to Korea where he served as the Officer-in-Charge <strong>of</strong><br />
the Inchon Field Office, 502d MI Battalion from May 1963 to May 1964. His next assignment was at Fort<br />
Holabird where CPT Strom would serve the next 19 months as the Aide-de-Camp to the Commanding<br />
General, <strong>Intelligence</strong> School, Fort Holabird.<br />
In July 1967, Major Strom was assigned as the <strong>Intelligence</strong> Officer to the Army’s Alternate Command<br />
Post, Operations Group, Army War College at Carlisle Barracks. After two years in Pennsylvania, MAJ<br />
Strom took command <strong>of</strong> the 519 th MI Battalion, 525 th MI Group serving in combat operations in Vietnam.<br />
In January 1970, he took command <strong>of</strong> the 4 th MI Battalion, 525 th MI Group also conducting operations in<br />
the Delta region <strong>of</strong> Vietnam. After concluding his second command, Lieutenant Colonel Strom reported to<br />
Munich, Germany, where he took command <strong>of</strong> his third battalion, the 18 th MI Battalion, 66 th MI Group.<br />
He left command in March 1972 and complete 16 months as the Adjutant <strong>of</strong> the 66 th MI Group in Munich<br />
before returning to Washington, D.C. where he would become a CI Officer and Executive Officer in the<br />
Office <strong>of</strong> the Assistant Chief <strong>of</strong> Staff for <strong>Intelligence</strong>, Department <strong>of</strong> the Army. LTC Strom served a little<br />
over two years in the Pentagon and then became the Deputy Commander, U.S. Army Special Security<br />
Group in Washington. Moving over to DIA approximately one year later, he became the Staff Chief, Special<br />
<strong>Intelligence</strong> Operations from June 1977 to June 1978.<br />
In July <strong>of</strong> that year, Colonel Strom took command <strong>of</strong> the 500 th MI Brigade, INSCOM at Camp Zama,<br />
Japan. Two years later, in July 1980, he assumed the duties as the Deputy Commandant and served as<br />
the Commandant <strong>of</strong> the U.S. Army <strong>Intelligence</strong> Center (USAIC), Fort Huachuca, Arizona. Early in 1982,<br />
BG Strom returned to Washington, D.C. to become the Deputy Assistant Chief <strong>of</strong> Staff for <strong>Intelligence</strong>,<br />
Department <strong>of</strong> the Army.<br />
His final assignment was as the Deputy Chief <strong>of</strong> Staff for <strong>Intelligence</strong>, U.S. Forces Command (FORSCOM),<br />
Fort McPherson, Georgia. It was during this tour that he and his staff developed a workable language<br />
maintenance program fitting the reserve components, as well as active forces, to keep pace with the requirements<br />
<strong>of</strong> an army facing the need for language<br />
facility. In March 1985, he retired from active duty<br />
in the U.S. Army after having served honorably for<br />
31 years.<br />
Brigadier Strom’s awards and badges include<br />
the Distinguished Service Medal, Legion <strong>of</strong> Merit,<br />
Bronze Star, Meritorious Service Medal (3 OLCs),<br />
National Defense Medal (1 OLC), Vietnamese Service<br />
Medal, Department <strong>of</strong> Army Staff Badge, U.S. and<br />
Vietnamese Parachutist Wings.<br />
Chief Warrant Officer Five Wallace S.<br />
Price, (U.S. Army, Retired)<br />
A native <strong>of</strong> Oregon, Chief Warrant Officer Wally<br />
Price began his Army career in 1966 with the<br />
Army Security Agency (ASA). He attended Defense<br />
Language Institute (DLI) for Czech language training,<br />
and following advanced training at Goodfellow,<br />
AFB, Texas was assigned to Detachment J, 16 th<br />
ASA Field Station, Schneeberg, Federal Republic <strong>of</strong><br />
Germany. From 1967 until 1970, he provided intelligence<br />
support for U.S. Army Europe and NATO<br />
commands during the Warsaw Pact invasion <strong>of</strong><br />
Czechoslovakia.<br />
64 <strong>Military</strong> <strong>Intelligence</strong>
Upon completion <strong>of</strong> his tour <strong>of</strong> duty in 1970,<br />
he returned to civilian life to attend school, graduating<br />
in 1974 from the University <strong>of</strong> Texas at<br />
Austin with a BA in Slavic languages. In 1975 he<br />
returned to active duty in the ASA. His initial assignment<br />
was as a Technical Language Advisor at<br />
DLI, where he worked with native instructors to<br />
provide unclassified training in military occupational<br />
specialty (MOS) related military and technical<br />
terminology. In 1976 he was appointed as a<br />
Warrant Officer and returned to Germany, where<br />
he served as a watch supervisor overseeing operations<br />
at the U.S. Army Field Station Augsburg.<br />
While there, he achieved certification by the<br />
National Security Agency (NSA) as a Language<br />
Analyst and Voice Language Analyst. He became<br />
pr<strong>of</strong>icient in three languages–Czech, Russian and<br />
German, and maintained his pr<strong>of</strong>iciency for the<br />
remainder <strong>of</strong> his military career.<br />
CWO Price returned to the DLI Foreign Language<br />
Center in December 1980 for advanced language<br />
training in Czech, graduating with honors. He remained<br />
for a year as a Training Officer in the Slavic<br />
Language Group until September 1981. Heading to<br />
Fort Devens, Massachusetts from DLI, CWO Price<br />
became the Chief Instructor and Officer in Charge <strong>of</strong><br />
the MOS 98G (Voice Intercept Operator) Task Force.<br />
He returned to Germany for a third tour in 1983,<br />
serving in several different positions at Field Station<br />
Augsburg. While there, he served on the task force<br />
responsible for transitioning <strong>of</strong> the field stations<br />
into the 701 st MI Brigade. He would serve at Field<br />
Station Augsburg until March 1986.<br />
Fort Meade became CWO Price’s home again<br />
from April 1986 until December 1991. While there<br />
he first was assigned to Operations Group A at<br />
NSA, where he served in sensitive technical and<br />
leadership positions. Although his title would<br />
be Senior Technician and Deputy Branch Chief,<br />
NSA, he would serve in a variety <strong>of</strong> roles. During<br />
Operations Desert Shield and Storm, he volunteered<br />
to augment the Cryptologic Support Group<br />
at U.S. Central Command (CENTCOM) Forward<br />
Headquarters in Riyadh, Saudi Arabia, where he<br />
served as a team leader directing CSG operations<br />
on watch. In 1992, he became the Deputy Chief,<br />
Exploitation and Production, Bravo Company,<br />
743 rd MI Battalion, Menwith Hill Station, United<br />
Kingdom. While serving in England, CW5 Price<br />
helped lead the Support <strong>Military</strong> Operations efforts<br />
for Operations Provide Comfort, Northern<br />
and Southern Watch in Southwest Asia and for<br />
NATO operations in the Balkans.<br />
Chief Warrant Officer Five Price returned to Fort<br />
Meade in November 1993, as the Team Chief and<br />
the NSA representative to the National <strong>Military</strong><br />
Command Center, where he assisted in establishing<br />
the Cryptologic Support Team, and ultimately the<br />
Cryptologic Support Group at the National <strong>Military</strong><br />
Joint <strong>Intelligence</strong> Center. Nearly two years later in<br />
the spring <strong>of</strong> 1995, CW5 Price was transferred to<br />
the 344 th MI Battalion, Goodfellow AFB, where he<br />
served as the Officer-in-Charge <strong>of</strong> the MOS 98G<br />
training where he oversaw the design, planning and<br />
execution <strong>of</strong> all Army SIGINT/Electronic Warfare<br />
(EW) linguist training.<br />
In 1997 he was assigned as Senior Technical<br />
Advisor in the Army Technical Control and<br />
Analysis Element to the 704th MI Brigade. While<br />
there, and following the 9/11 attacks and onset<br />
<strong>of</strong> Operation Enduring Freedom (OEF), CW5<br />
Price initiated an international collaborative effort<br />
with Commonwealth Allies, helping to create<br />
the first U.S./Canadian SIGINT-EW Operations<br />
Coordination Center in Afghanistan using the<br />
NATO model. Later he worked on the creation <strong>of</strong> the<br />
first NSA Cryptologic Support Teams deployed to<br />
Operation Iraqi Freedom (OIF). In July <strong>of</strong> 2003, he<br />
served as the Special Assistant for <strong>Military</strong> Affairs<br />
to the SIGINT Director, NSA. CW5 Price retired<br />
from the Army after 35 years <strong>of</strong> distinguished service.<br />
After retirement, he began work at INSCOM<br />
in the Army Cryptologic Operations <strong>of</strong>fice at Fort<br />
Meade. He became a driving force in developing<br />
the concept for SIGINT Foundry support. He continues<br />
today serving as a DA civilian assigned in<br />
support <strong>of</strong> INSCOM as an <strong>Intelligence</strong> Staff Officer<br />
in the Army Cryptologic Office. Currently, he is<br />
engaged in planning and coordinating pre-deployment<br />
orientation visits to NSA for division, brigade<br />
and battalion commanders preparing for<br />
OIF and OEF rotations as part <strong>of</strong> a FORSCOM G2<br />
program.<br />
Chief Warrant Officer Five Price’s awards and<br />
decorations include the Defense Superior Service<br />
Medal (1 OLC), the Legion <strong>of</strong> Merit, the Bronze<br />
Star Medal, the Defense Meritorious Medal, the<br />
Meritorious Service Medal (1 OLC), the Joint Services<br />
April - June 2009 65
Commendation Medal, the Army Commendation Medal (1 OLC), the Army Achievement Medal, and the<br />
Joint Chiefs <strong>of</strong> Staff Identification Badge.<br />
Chief Warrant Officer Three Doris I. Allen, (U.S. Army, Retired)<br />
Chief Warrant Officer Three Doris I. “Lucki” Allen,<br />
a native <strong>of</strong> El Paso, Texas, enlisted into the Women’s<br />
Army Corp through Jackson, Mississippi in late<br />
1950. She completed basic, then advanced training,<br />
as an Entertainment Specialist at the Adjutant<br />
General School in 1951 at Fort Lee, Virginia. She<br />
spent a few months at the Presidio <strong>of</strong> San Francisco,<br />
California and Fort Lewis, Washington before going<br />
overseas. Private First Class Allen served for a year<br />
and half as an Entertainment Specialist organizing<br />
Soldier shows and as the Editor <strong>of</strong> the <strong>Military</strong><br />
Newspaper for the Army Occupation Forces in support<br />
<strong>of</strong> the Korean War in Camp Sendai, Japan.<br />
Upon returning Corporal Allen was assigned as<br />
a radio broadcast specialist at Camp Stoneman in<br />
California. After the closing <strong>of</strong> Camp Stoneman,<br />
Specialist Five Allen was assigned to Oakland Army<br />
Base, California and then attended the Armed<br />
Forces Information School at Fort Slocum, New<br />
York for the Information Specialist course. In 1956,<br />
SP5 Allen returned to Japan and served as a Public<br />
Information Officer and Newspaper Editor. After<br />
two years in Japan, she returned to the U.S. and<br />
served as an Information Specialist. From 1958, she served for five years as an Information Specialist<br />
for the Headquarters at Fort Monmouth. After completing French language training at DLI in 1963, SP5<br />
Allen became the first military female trained in a Prisoner <strong>of</strong> War Interrogation course at the U.S. Army<br />
<strong>Intelligence</strong> School, Fort Holabird.<br />
Upon the completion, she was assigned as an interrogator to Headquarters, U.S. Continental Army<br />
Command <strong>Intelligence</strong> Center, Fort Bragg. For the next two years she would serve as the sole strategic<br />
intelligence analyst covering Latin America affairs until 1965. While at Fort Bragg, and as one <strong>of</strong> only 22<br />
persons in the entire Armed Forces to hold that rank, Specialist Seven Allen completed interrogation and<br />
intelligence analyst courses where she was the honor graduate in three consecutive courses conducted by<br />
the Third U.S. Army Area <strong>Intelligence</strong> School in 1967.<br />
SP7 Allen would then report to Vietnam and serve as the Senior <strong>Intelligence</strong> Analyst, Army Operations<br />
Center, Headquarters, U.S. Army (USARV) at Long Binh, Vietnam. While in Vietnam she started her second<br />
tour and held the position <strong>of</strong> Supervisor, Security Division, Office <strong>of</strong> the Assistant Chief <strong>of</strong> Staff,<br />
Security, Plans, and Operations, Headquarters, 1 st Logistical Command, Vietnam. In the Spring <strong>of</strong> 1970<br />
she would be appointed as a Warrant Officer. She was then one <strong>of</strong> only nine female warrant <strong>of</strong>ficers in MI<br />
and one <strong>of</strong> only 23 in the entire Army at the time.<br />
WO Allen began her third consecutive tour in Vietnam in March 1970 as the Officer in Charge <strong>of</strong> the<br />
Translation Branch, Combined Document Exploitation Center–MACV, Saigon, Vietnam. Despite not<br />
being able to speak Vietnamese, WO Allen supervised approximately 40 South Vietnamese nationals<br />
employed in the translation <strong>of</strong> the large amount <strong>of</strong> captured enemy documents brought to the center<br />
on a daily basis. Her loyalty, diligence, and devotion in all <strong>of</strong> her assignments in Vietnam earned her<br />
the Bronze Star with 2 Oak Leaf clusters.<br />
66 <strong>Military</strong> <strong>Intelligence</strong>
Returning to the U.S. from Vietnam in September 1970, she would serve as an Instructor for Prisoner <strong>of</strong><br />
War Interrogations, Army <strong>Intelligence</strong> Center and School, Fort Holabird and moved with the school in 1971<br />
to Fort Huachuca. After completing the CI Transition Course in 1971, WO Allen returned to DLI where she<br />
completed the German course.<br />
After a stint with the intelligence unit at the Presidio <strong>of</strong> San Francisco, Chief Warrant Officer Two Allen<br />
was sent overseas. Her follow on assignment was as a Special Agent with the 527th MI Brigade, Federal<br />
Republic <strong>of</strong> Germany. In 1977, CW2 Allen reported to the INSCOM’s CI and Signal Security Battalion,<br />
Presidio <strong>of</strong> San Francisco, where she worked as the Senior CI Agent and Security Manager. While at the<br />
Presidio, CW2 Allen would be promoted to Chief Warrant Officer Three in 1978. CW3 Allen retired after a<br />
distinguished 30 year career in 1980.<br />
Chief Warrant Officer Three Allen’s awards and decorations include the Bronze Star (2 OLCs), Meritorious<br />
Service Medal, Army Commendation Medal, Good Conduct Medal (6th award), Army <strong>of</strong> the Occupation<br />
Medal (Japan), National Defense Service Medal (1 OLC), Vietnam Service Medal (10 Campaigns), United<br />
Nations Service Medal, the Republic <strong>of</strong> Vietnam Campaign Medal, the Korean Service Medal, Presidential<br />
Unit Citation, Meritorious Unit Commendation, and the Vietnam Cross <strong>of</strong> Gallantry with Palm.<br />
Command Sergeant Major Odell Williams, (U.S. Army, Retired, Deceased)<br />
Command Sergeant Major Odell Williams entered<br />
the U.S. military on July 26, 1955 and was<br />
first trained as an Aircraft Mechanic, and then<br />
later trained and served as a Firefighter in the<br />
U.S. Navy Reserves until May 1960. In September<br />
1960, he entered the U.S. Army and attended the<br />
Manual Morse Collector’s Course at Fort Devens,<br />
graduating in April 1961. That same month, then<br />
Specialist Four Williams would report to his first assignment<br />
as a Morse Interceptor at Vint Hill Farms<br />
Station, Virginia where he served until October<br />
1961. In November 1961 he reported to the 5 th<br />
Radio Research Unit, Bangkok, Thailand serving as<br />
a Morse Interceptor for a year and a half. Specialist<br />
Five Williams returned to the U.S. in April 1963<br />
where he would complete two more assignments as<br />
a Morse Interceptor. The first assignment was to the<br />
303rd ASA Battalion at Fort Carson, Colorado from<br />
May 1963 to May 1964, and then at Fort Lewis from<br />
June 1964 to June 1965.<br />
In summer <strong>of</strong> 1965, Staff Sergeant Williams served<br />
as Senior Morse Interceptor with Detachment 2, 3rd Radio Research Unit, U.S. Army Pacific and the 11th Radio Research Unit during combat operations in the Republic <strong>of</strong> Vietnam. The following year, September<br />
1966, he became Senior Morse Instructor at the Headquarters and Headquarters Company, ASA Training<br />
Center, Fort Devens, where he served in the position for three years.<br />
In the fall <strong>of</strong> 1969 Sergeant First Class Williams would transition from duties as instructor to those<br />
<strong>of</strong> leader and supervisor. In September, he reported for duty with A Company, ASA Field Station, Sobe,<br />
Okinawa, where he supervised all Morse Intercept operations. Because <strong>of</strong> his outstanding performance<br />
as supervisor, he was selected to become the A Company First Sergeant in April 1971, a position he held<br />
with distinction for nearly two years until he was reassigned in 1973. His reassignment brought SFC<br />
Williams back to the U.S. for additional training; first at the Cryptology Supervisor Course from April to<br />
May 1973, and then to Senior NCO training with C Company, ASA Support Battalion (SB), Fort Devens,<br />
April - June 2009 67
from May to July 1973. Following his training, SFC Williams would serve as a Senior Instructor with the<br />
Operations Company, SB, Fort Devens until May 1974. That same month he reported to 2 nd Battalion,<br />
ASA SB, Fort Devens and for a second time would serve as the First Sergeant <strong>of</strong> a company (F Company,<br />
2 nd Battalion).<br />
Two years later, from April 1976 to March 1977, he was assigned to Headquarters and Headquarters<br />
Company, ASA Field Station Korea where he served as Mission Management Supervisor and Operations<br />
Sergeant. In 1977, Master Sergeant Williams served as First Sergeant for the Operations Company, ASA<br />
Field Station Korea. In June 1977, MSG Williams returned to the U.S. where he would serve as First<br />
Sergeant for the fourth time with F Company, 2 nd Battalion, U.S. Army <strong>Intelligence</strong> School, Fort Devens.<br />
Having served for two years MSG Williams was selected attended the Army Sergeant Major’s Academy at<br />
Fort Bliss. In February 1980, he transferred to Germany to serve as the Operations Sergeant for Field<br />
Station Berlin. In June 1981, Command Sergeant Major Williams served as the S3 Sergeant Major, Field<br />
Station Berlin. CSM Williams was then assigned to Kunia, Wheeler Air Force Base, Hawaii in July 1982<br />
where he served for three years as the Command Sergeant Major for the Army component. His leadership<br />
and vision ensured that the field station at Kunia would become the premier listening post in the Pacific.<br />
Late in 1985, he became the Senior Enlisted Advisor to the National Security Agency/Central Security<br />
Service (NSA/CSS), U.S. Army Element NSA at Fort Meade. He served as the Command Sergeant Major<br />
for NSA/CSS for three years.<br />
CSM Williams was the first ever Command Senior Enlisted Advisor to the Director to the NSA where<br />
he led in a multi-service environment. His leadership and intelligence support contributed to the successful<br />
diplomacy and the executions <strong>of</strong> operations in incidences such as the TWA hijacking in Lebanon<br />
in June 1985, the rescue <strong>of</strong> the Achille Lauro in October 1985, and the bombing raid in Libya in April<br />
1986. CSM Williams retired in 1988 after honorably serving 33 years with a distinguished career in Army<br />
<strong>Intelligence</strong>.<br />
Command Sergeant Major Williams’ awards and badges include the Distinguished Service Medal, Legion<br />
<strong>of</strong> Merit, Bronze Star, Meritorious Service Medal (6 OLCs), National Defense Medal (1 OLC), Vietnamese<br />
Service Medal, Department <strong>of</strong> Army Staff Badge, U.S. Parachutist Wings, and the Vietnamese Parachutist<br />
Wings. In 2001 he was awarded the National <strong>Military</strong> <strong>Intelligence</strong> Association’s Major General John E.<br />
Morrison Award for outstanding pr<strong>of</strong>essionals.<br />
Command Sergeant Major Ronald D.<br />
Wright, (U.S. Army, Retired)<br />
Command Sergeant Major Ronald D. Wright is a<br />
native <strong>of</strong> Fort Smith, Arkansas. He enlisted in the<br />
U.S. Air Force and served from 1971 to 1975 as a<br />
parachute rigger. In 1979, after a four year break<br />
in military service, he entered the U.S. Army as an<br />
<strong>Intelligence</strong> Analyst. Specialist Wright served as the<br />
Senior <strong>Intelligence</strong> Analyst and as the Assistant<br />
NCOIC <strong>of</strong> the Battle Information Coordination<br />
Center, 3 rd Brigade, 101 st Airborne Division, Fort<br />
Campbell. During his assignment at Fort Campbell,<br />
SPC Wright was promoted to Sergeant. He would then<br />
be assigned to the Headquarters and Headquarters<br />
Company, 2 nd Armored Division (Forward) in the<br />
Federal Republic <strong>of</strong> Germany. While in Germany,<br />
he exhibited initiative, resourcefulness, and pr<strong>of</strong>essional<br />
competence. Because <strong>of</strong> these qualities, he<br />
was selected by his leadership to compete for NCO<br />
68 <strong>Military</strong> <strong>Intelligence</strong>
<strong>of</strong> the Year for U.S. Army, Europe. In 1983, Sergeant<br />
Wright’s exemplary past performance and future<br />
potential was recognized when he was selected. He<br />
was also promoted to Staff Sergeant and inducted<br />
into the U.S. Army Europe Sergeant Morales Club.<br />
That same year, SSG Wright returned to the U.S.<br />
and served as an instructor for the <strong>Intelligence</strong><br />
Analyst Course, USAIC and School, Fort Huachuca.<br />
He would then move to the NCO Academy as a Senior<br />
Instructor from 1984 to 1986, teaching <strong>Intelligence</strong><br />
Analysis. In 1987, he returned to Germany and<br />
served as the First Sergeant for Headquarters and<br />
Headquarters Battery, 56 th Field Artillery Command<br />
(Pershing Missile). In the fall <strong>of</strong> 1990, Master<br />
Sergeant Wright reported in to the 111 th MI Brigade,<br />
Fort Huachuca where he became the Operations<br />
Sergeant Major responsible for preparing plans,<br />
operations, and providing soldier training for the<br />
6,000 <strong>of</strong>ficers and enlisted personnel at the Army’s<br />
intelligence schoolhouse. After eight months as the<br />
Brigade Operations Sergeant Major, MSG Wright<br />
became the First Sergeant <strong>of</strong> C Company, 304 th MI<br />
Battalion, 111 th MI Brigade. C Company was the<br />
only deployable Pioneer Unmanned Aerial Vehicle<br />
(UAV) company in the Army. His efforts contributed<br />
to the selection <strong>of</strong> the Hunter as the Army’s<br />
next generation UAV. First Sergeant Wright was<br />
instrumental in the development <strong>of</strong> the MOS 96U<br />
UAV Operator. He served as a subject matter expert<br />
and briefed senior Army leaders worldwide on<br />
the UAV program. He also helped draft the ground<br />
rules for UAV airspace management, ensuring the<br />
safety <strong>of</strong> other military and commercial air traffic.<br />
1SG Wright was soon thereafter selected and promoted<br />
to Command Sergeant Major and attended<br />
the Command Sergeant Major’s course.<br />
In 1994 he reported to Fort Hood as the Command<br />
Sergeant Major <strong>of</strong> the 522 nd MI Battalion, 2 nd Armored<br />
Division. A year later, the unit was reflagged as the<br />
104 th MI Battalion, 4 th Infantry Division. Two years<br />
later, CSM Wright returned to Germany in 1996, and<br />
became the Command Sergeant Major <strong>of</strong> the 302 nd<br />
MI Battalion, 205 th MI Brigade. He was then selected<br />
to become the 205 th MI Brigade Command Sergeant<br />
Major. Following his successful tour in the Brigade,<br />
he was selected to serve as the INSCOM Command<br />
Sergeant Major at Fort Belvoir. As the senior enlisted<br />
advisor, his leadership was instrumental in positive<br />
changes to the command’s architecture, force struc-<br />
ture, training and combat development. He brought<br />
a unique perspective to the budgetary issues and<br />
provided input to the disposition <strong>of</strong> the command’s<br />
budget that totaled over 500 million dollars a year.<br />
CSM Wright oversaw the development and execution<br />
<strong>of</strong> the Command’s Strategic Business Plan. At<br />
the time INSCOM was responsible for over 12,500<br />
Soldiers and civilians located in 21 countries around<br />
the world. As INSCOM CSM, he also represented the<br />
Sergeant Major <strong>of</strong> the Army at various functions and<br />
meetings. CSM Ronald Wright retired in 2001 after<br />
serving his country honorably for 26 years.<br />
Command Sergeant Major Wright’s awards and<br />
decorations include the Distinguished Service<br />
Medal, the Meritorious Service Medal (4 OLCs), the<br />
Army Commendation Medal (3 OLCs), the Army<br />
Achievement Medal (1 OLC), the Army Good Conduct<br />
Medal (6 th award), the Air Force Good Conduct Medal,<br />
the National Defense Service (2 nd award), the Vietnam<br />
Service Medal, the NCO <strong>Pr<strong>of</strong>essional</strong> Development<br />
Ribbon (4 th award), the Overseas Service Ribbon (4 th<br />
award), the NATO Medal, the Republic <strong>of</strong> Vietnam<br />
Campaign Medal, the Army Superior Unit Award,<br />
the Air Force Parachute Riggers Badge, Air Assault<br />
Badge, Master Instructor Badge, and the German<br />
Marksmanship Badge. He received the Field Artillery’s<br />
Order <strong>of</strong> Saint Barbara and the MI Knowlton Award.<br />
CSM Wright is also an Honorary Member <strong>of</strong> the<br />
Sergeant Audie Murphy Club.<br />
2010 MI Corps Hall <strong>of</strong> Fame<br />
Nominations<br />
All commissioned <strong>of</strong>ficers, warrant <strong>of</strong>ficers, enlisted<br />
Soldiers, and civilian intelligence pr<strong>of</strong>essionals who<br />
have served in a U.S. Army intelligence unit or in an<br />
intelligence position elsewhere within the U.S. Army<br />
are eligible for nomination. Full nomination procedures<br />
can be obtained by contacting the Office <strong>of</strong> the<br />
Chief, <strong>Military</strong> <strong>Intelligence</strong>, Deputy Director, U.S.<br />
Army <strong>Intelligence</strong> Center and Fort Huachuca, ATTN:<br />
ATZS-MI (23), 110 Rhea Street, Second Floor, Fort<br />
Huachuca, Arizona 85613-7080, (520) 533-1190, or<br />
timothy.quinn@us.army.mil. The Nomination Board<br />
convenes annually at the direction <strong>of</strong> the Chief <strong>of</strong><br />
the MI Corps (the Commanding General, U.S. Army<br />
<strong>Intelligence</strong> Center and Fort Huachuca), usually during<br />
September/October. Although nominations are<br />
accepted year round, to be considered by the current<br />
year Nomination Board, nomination packets must be<br />
received not later than 15 September.<br />
April - June 2009 69
<strong>Pr<strong>of</strong>essional</strong> Reader<br />
Afghanistan and the Troubled<br />
Future <strong>of</strong> Unconventional Warfare<br />
by Hy S. Rothstein<br />
(Annapolis, Maryland: Naval<br />
Institute Press, 2006), 218 Pages,<br />
$17,75, ISBN 1-59114-745-X<br />
Afghanistan and the Troubled Future <strong>of</strong> Unconventional<br />
Warfare is an examination <strong>of</strong> why the U.S. <strong>Military</strong><br />
has difficulty conducting Unconventional Warfare<br />
(UW) despite the increased funding and attention<br />
given to special operations and intelligence used<br />
in conducting UW operations. The author, Hy<br />
Rothstein, is a former career Special Forces <strong>of</strong>ficer<br />
who currently teaches at the Naval Postgraduate<br />
School. He argues that the types <strong>of</strong> operations that<br />
include UW and stability operations are not necessarily<br />
best conducted by conventional means<br />
although, in Afghanistan for example, a conventional<br />
approach is what has been taken. In order<br />
to support the author’s perspective, the first<br />
one-third <strong>of</strong> the work is organized into chapters<br />
that focus on the historical context <strong>of</strong> UW. These<br />
early chapters describe how special operations<br />
have evolved to meet the challenges <strong>of</strong> these types<br />
<strong>of</strong> missions. This background is both informative<br />
and contextually relevant for those pr<strong>of</strong>essionals<br />
who deal with the complexity <strong>of</strong> UW to include<br />
Conventional Troops and Special Operations.<br />
The author focuses on Special Forces although<br />
Psychological Operations and Civil Affairs are also<br />
discussed at length.<br />
Of the many bureaucratic obstacles facing Special<br />
Operations are organizational constraints and a failure<br />
to develop processes <strong>of</strong> innovation in the army.<br />
Rothstein thus utilizes the remaining two-thirds <strong>of</strong><br />
his work in a progression that moves from theoretical<br />
to practical considerations. First, he focuses<br />
on Organizational Theory and how the concept <strong>of</strong><br />
Contingency Theory could be a more successful<br />
model for the organizational structure <strong>of</strong> the high-<br />
est levels <strong>of</strong> military decision making. For example,<br />
Rothstein argues that the Department <strong>of</strong> Defense<br />
(DOD) is not organizationally structured to allow<br />
for options that fall outside <strong>of</strong> conventional warfare<br />
paradigms. Contingency Theory, however, could potentially<br />
guide DOD decision making in a more appropriate<br />
direction for the types <strong>of</strong> future conflicts<br />
that will invariably be unconventional by definition<br />
and difficult to predict in nature. As the author<br />
notes, “Organizational scholars have concluded that<br />
Weberian-type bureaucracy found in many large,<br />
modern organizations is ineffective in coping with<br />
the demands <strong>of</strong> a dynamic and uncertain environment.<br />
Additionally, standardized procedures, a fundamental<br />
tenet <strong>of</strong> bureaucracy, inhibit innovation<br />
and the flexibility necessary to effectively operate<br />
Reviewed by First Lieutenant Nathaniel L. Moir<br />
70 <strong>Military</strong> <strong>Intelligence</strong>
under conditions <strong>of</strong> uncertainty. Contingency theory<br />
is the alternative organizational model for environments<br />
where Weberian Bureaucracy falls short.”<br />
Further, Rothstein spends a great deal <strong>of</strong> effort in<br />
demonstrating how and why UW must not be diluted<br />
by focusing on the attrition end <strong>of</strong> the spectrum<br />
<strong>of</strong> operations, a fact that is <strong>of</strong> great importance<br />
when conducting stability operations. The Special<br />
Forces, it is argued, is being over-used for direct<br />
action (DA) operations (due to there being many<br />
other assets that can conduct DA) and it needs to<br />
be tasked more usefully as practitioners <strong>of</strong> UW, a<br />
niche skill unique to special operations.<br />
When stability operations are considered in the<br />
context <strong>of</strong> the War on Terror, urgency is added as<br />
<strong>American</strong> public support is needed to continue<br />
political support for the army’s work in Iraq and<br />
Afghanistan. Rothstein supports the view that<br />
success in those campaigns must be measured<br />
by the confidence <strong>of</strong> the host nation populace:<br />
“The war on terrorism requires the use <strong>of</strong> Special<br />
Forces teams, and Civil Affairs and Psychological<br />
Operations units, all tasked to do UW. Success in<br />
this war will require an emphasis on winning local<br />
cooperation. Conventional and DA forces are least<br />
likely to elicit this, while UW forces are most likely<br />
to.” The dichotomy, as described by Mr. Rothstein,<br />
<strong>of</strong> how conventional and unconventional capabilities<br />
conduct stability operations elicits a historical<br />
comparison <strong>of</strong> stability operations with the Gordian<br />
knot. How to best metaphorically unknot that classical<br />
enigma may be through the type <strong>of</strong> organizational<br />
structure that best utilizes Contingency<br />
Theory. However, it may also be the type <strong>of</strong> organization<br />
that is structurally aligned with that theory<br />
but still possesses the flexibility to incorporate<br />
conventional capabilities and forces. In sum, Mr.<br />
Rothstein’s work poses important questions that<br />
may guide decision making and organizational<br />
structure for conflicts, in Afghanistan and elsewhere,<br />
that require UW capabilities.<br />
April - June 2009 71
<strong>Intelligence</strong> Philatelic Vignettes<br />
“Operation Ruthless”<br />
by Mark Sommer<br />
By 1940 the greatest threat to the Allies was U-boat attacks on North Atlantic convoys. If the Allies could<br />
discover in advance where U-boat packs were assembling, they could direct convoys away from them.<br />
Bletchley Park’s code breakers were not breaking German Naval Enigma code. It was essential that current<br />
Naval Enigma material for them to work on should be captured from German ships. On 12 September<br />
1940, Lieutenant Commander Ian Fleming, RNVR, Personal Assistant to the Director <strong>of</strong> Naval <strong>Intelligence</strong>,<br />
concocted an extraordinary plan to crash-land a captured German plane in the English Channel and overpower<br />
the patrol boat crew that came to rescue its “survivors,” thereby gaining access to the much needed<br />
code books. Fleming’s proposal, Codename ‘Operation Ruthless’ was as follows:<br />
Fleming added that the pilot should be a ‘tough bachelor able to swim’; and that a German-speaker would<br />
also be needed to travel on the bomber. He put his own name forward. Is it coincidental that Commander<br />
James Bond, RN, 007, was also tough, a bachelor and an accomplished linguist? ‘Operation Ruthless’ was<br />
quickly given the go-ahead. A plane and crew were procured and Fleming travelled down to Dover to put<br />
it into practice. However, to the deep frustration <strong>of</strong> the Bletchley Park’s code breakers, the plan was abandoned<br />
due to the lack <strong>of</strong> suitable German boats operating at night.<br />
Frank Birch, Head <strong>of</strong> German Naval Section at Bletchley Park, lamented that “Turing and Twinn (both<br />
key code breakers at Bletchley Park) came to me like undertakers cheated <strong>of</strong> a nice corpse ... all in a stew<br />
about the cancellation <strong>of</strong> Operation Ruthless.” It now seemed that only the Naval equivalent <strong>of</strong> a miracle<br />
would enable the code breakers to break into Naval Enigma but the prolific genius <strong>of</strong> Ian Fleming for writing<br />
spy plots had been born.<br />
The Bletchley Park Post Office, in cooperation with their Museum Trust, produces highly collectible philatelic items, and as<br />
part <strong>of</strong> their fundraising functions, produced these stamps and commemorative covers, to honor the birth <strong>of</strong> James Bond<br />
creator/author Ian Fleming, on his one hundredth birthday, January 8, 2008.<br />
72 <strong>Military</strong> <strong>Intelligence</strong>
COntACt And ArtIClE<br />
Submission Information<br />
This is your magazine. We need your support by writing and submitting articles for publication.<br />
When writing an article, select a topic relevant<br />
to the <strong>Military</strong> <strong>Intelligence</strong> (MI) and <strong>Intelligence</strong><br />
Communities (IC).<br />
Articles about current operations and exercises;<br />
TTPs; and equipment and training are always welcome<br />
as are lessons learned; historical perspectives;<br />
problems and solutions; and short “quick tips” on<br />
better employment or equipment and personnel. Our<br />
goals are to spark discussion and add to the pr<strong>of</strong>essional<br />
knowledge <strong>of</strong> the MI Corps and the IC at large.<br />
Propose changes, describe a new theory, or dispute<br />
an existing one. Explain how your unit has broken<br />
new ground, give helpful advice on a specific topic, or<br />
discuss how new technology will change the way we<br />
operate.<br />
When submitting articles to MIPB, please take the<br />
following into consideration:<br />
Ê Feature articles, in most cases, should be under<br />
3,000 words, double-spaced with normal margins<br />
without embedded graphics. Maximum length is<br />
5,000 words.<br />
Ê Be concise and maintain the active voice as much<br />
as possible.<br />
Ê We cannot guarantee we will publish all submitted<br />
articles and it may take up to a year to publish<br />
some articles.<br />
Ê Although MIPB targets themes, you do not need to<br />
“write” to a theme.<br />
Ê Please note that submissions become property <strong>of</strong><br />
MIPB and may be released to other government<br />
agencies or nonpr<strong>of</strong>it organizations for re-publication<br />
upon request.<br />
What we need from you:<br />
Ê A release signed by your unit or organization’s<br />
information and operations security <strong>of</strong>ficer/<br />
SSO stating that your article and any accompanying<br />
graphics and photos are unclassified,<br />
nonsensitive, and releasable in the public domain<br />
OR that the article and any accompanying<br />
graphics and photos are unclassified/FOUO (IAW<br />
AR 380-5 DA Information Security Program). A<br />
sample security release format can be accessed at<br />
our website at https://icon.army.mil.<br />
Ê A cover letter (either hard copy or electronic) with<br />
your work or home email addresses, telephone<br />
number, and a comment stating your desire to<br />
have your article published.<br />
Ê Your article in Word. Do not use special document<br />
templates.<br />
Ê A Public Affairs or any other release your installation<br />
or unit/agency may require. Please include<br />
that release(s) with your submission.<br />
Ê Any pictures, graphics, crests, or logos which are<br />
relevant to your topic. We need complete captions<br />
(the Who, What, Where, When, Why, and How),<br />
photographer credits, and the author’s name on<br />
photos. Do not embed graphics or photos within<br />
the article. Send them as separate files such as<br />
.tif or .jpg and note where they should appear<br />
in the article. PowerPoint (not in .tif or .jpg<br />
format) is acceptable for graphs, etc. Photos<br />
should be at 300 dpi.<br />
Ê The full name <strong>of</strong> each author in the byline and a<br />
short biography for each. The biography should<br />
include the author’s current duty assignment,<br />
related assignments, relevant civilian education<br />
and degrees, and any other special qualifications.<br />
Please indicate whether we can print your contact<br />
information, email address, and phone numbers<br />
with the biography.<br />
We will edit the articles and put them in a style and<br />
format appropriate for MIPB. From time to time, we<br />
will contact you during the editing process to help<br />
us ensure a quality product. Please inform us <strong>of</strong> any<br />
changes in contact information.<br />
Submit articles, graphics, or questions to the<br />
Editor at mipb@conus.army.mil. Our fax number is<br />
520.538.1005. Submit articles by mail on disk to:<br />
MIPB<br />
ATTN ATZS-CDI-DM (Smith)<br />
U.S. Army <strong>Intelligence</strong> Center and Fort Huachuca<br />
Box 2001, Bldg. 51005<br />
Fort Huachuca, AZ 85613-7002<br />
Contact phone numbers: Commercial 520.538.0956<br />
DSN 879.0956.<br />
April - June 2009 73
74 <strong>Military</strong> <strong>Intelligence</strong>
April - June 2009 75
Nomination Information for the 2010<br />
C SM Doug Russell Award<br />
The annual CSM Doug Russell Award recognizes<br />
the outstanding achievements <strong>of</strong> Soldiers within<br />
or on the behalf <strong>of</strong> the <strong>Military</strong> <strong>Intelligence</strong> (MI)<br />
Community. Eligibility criteria include:<br />
Ê Rank <strong>of</strong> sergeant (E-5) or below.<br />
Ê In the Active Army, Army Reserve, or National<br />
Guard.<br />
Ê Actions that directly contribute to the MI Corps.<br />
Ê Must be fully eligible for re-enlistment.<br />
Ê Does not have to hold an MI MOS.<br />
Anyone may nominate a Soldier for this award.<br />
There can be only one nomination from each <strong>of</strong> the<br />
following:<br />
Ê MI Group, Brigade, Battalion.<br />
Ê Brigade Troop/Support Battalions within a maneuver<br />
division.<br />
Ê MI Support Elements (G2/Brigade S2/Battalion<br />
S2) within a maneuver division.<br />
Ê DCSINT oriented organizations (EAC units and<br />
positions not formally assigned to a specific MI<br />
Group/Brigade/Battalion).<br />
Nomination packets must be unclassified. All<br />
classified packets are automatically eliminated<br />
from the award process. Nomination packets must<br />
be submitted in hard copy only (No disk or email).<br />
The only exception is the photograph, which must<br />
be sent via email to the POCs, in addition to the<br />
hardcopy. Packets must contain:<br />
Ê Cover letter signed by the originator <strong>of</strong> the<br />
nomination.<br />
Ê Narrative specifically stating the nominee’s key<br />
accomplishments and achievements, and the<br />
impact on the MI Corps.<br />
Ê Endorsement letter from the first 0-6 in the<br />
chain <strong>of</strong> command.<br />
Ê Biography <strong>of</strong> the nominee.<br />
Ê 8" X 10" photograph <strong>of</strong> the nominee in Class A<br />
uniform (DA Photograph preferred).<br />
Ê Copy <strong>of</strong> the nominee’s Enlisted Record Brief.<br />
Ê Completed DD Form 2266 Hometown News<br />
Release Information (Unsigned).<br />
Waivers for other than an 0-6 endorsement may be<br />
requested from the POC below.<br />
Unclassified nomination packets must be sent via<br />
Certified Mail to the MI Corps CSM to:<br />
Headquarters, U.S. Army <strong>Intelligence</strong><br />
Center and Ft. Huachuca<br />
ATTN: CSM Doug Russell Award (ATZS-CSM)<br />
Alvarado Hall 1903 Hatfield Street<br />
Fort Huachuca, AZ 85613-6000<br />
Nominations must be received by 15 December<br />
2009. Nomination packets will be reviewed from<br />
4 to 8 January 2010 by a board consisting <strong>of</strong> the<br />
MI Corps CSM, Honorary MI Corps CSM, INSCOM<br />
CSM, Army DCSINT G2 CSM, and CSM Doug<br />
Russell, Retired. The Chief <strong>of</strong> the MI Corps has final<br />
approval <strong>of</strong> the board results.<br />
The winner will be invited to attend the MI CSM/<br />
SGM conference in March 2010 to receive:<br />
Ê The CSM Doug Russell Award.<br />
Ê The Knowlton Award (Courtesy <strong>of</strong> MICA).<br />
Ê A one year MICA membership (Courtesy <strong>of</strong> MICA).<br />
Ê The <strong>American</strong> <strong>Military</strong> Society President’s Coin.<br />
Ê A one year membership in the <strong>American</strong> <strong>Military</strong><br />
Society.<br />
Ê A plaque inscribed with the MI Soldier’s Creed.<br />
Ê A $150.00 gift certificate from AAFES.<br />
The winner will be announced NLT 22 January<br />
2010.<br />
POC: CSM Wyk<strong>of</strong>f at DSN 821-1145 or 821-1146;<br />
Comm (520) 533-1145 or 533-1146 and via email at<br />
gerardus.wyk<strong>of</strong>f@conus.army.mil OR SGM Phillip<br />
Sharper at DSN 879-1211; Comm (520) 538-1211)<br />
and via email at phillip.sharper@conus.army.mil.<br />
76 <strong>Military</strong> <strong>Intelligence</strong>
Sergeant Julian M. Jones<br />
2009 Doug Russell Award Recipient<br />
Sergeant Jones was born on 19 April 1985 in Boone, Iowa. He graduated from Basic Training at Fort<br />
Jackson, South Carolina in June 2003 and went to the Defense Language Institute (DLI), Monterey,<br />
California. At that time, he was a Signals <strong>Intelligence</strong> Soldier, but during the course <strong>of</strong> his Korean studies,<br />
he switched to MOS 35M, Human <strong>Intelligence</strong> (HUMINT) Collector. After DLI, he came to Fort Huachuca,<br />
Arizona to complete his Advanced Individual Training.<br />
His first duty station was Bravo Company, 524 th MI Battalion, 501 st MI Brigade, Republic <strong>of</strong> Korea. From<br />
December 2005 until June 2006, SGT Jones served as a liaison <strong>of</strong>ficer in the Waegwan MI Detachment.<br />
In 2006, he deployed to Afghanistan in support <strong>of</strong> the Combined Joint Special Operations Task Force-<br />
Afghanistan (CJSOTF-A).<br />
While in Afghanistan, SGT Jones served as a Tactical HUMINT Team Leader for fifteen months. He conducted<br />
over 40 enemy prisoner <strong>of</strong> war interrogations at a field detention site and was responsible for maintaining<br />
the site, enabling intelligence operations to occur at a remote firebase. The intelligence collected<br />
at this location drove successful operations for CJSOTF-A forces. He was awarded the Bronze Star Medal,<br />
the Purple Heart, and the Combat Action Badge for his accomplishments and contributions during this<br />
deployment.<br />
Upon returning from this deployment, SGT Jones was assigned to the Busan MI Detachment, also a<br />
part <strong>of</strong> the 524 th MI Battalion. While assigned to the Busan detachment, he provided language support to<br />
the Force Protection mission and was in charge <strong>of</strong> the Strategic Debriefing mission. From November 2007<br />
until November 2008, he played a major role in the surge operations for Key Resolve and other operations<br />
and exercises.<br />
His dedication to the HUMINT mission, the combination <strong>of</strong> his experience, language, and strategic debriefing<br />
credentials make him a major contributor to the 524 th MI Battalion’s and the U.S. Army’s tactical<br />
and strategic missions.
ATTN: MIPB (ATZS-CDI-DM-12)<br />
BOX 2001<br />
BLDG 51005<br />
FORT HUACHUCA AZ 85613-7002<br />
Headquarters, Department <strong>of</strong> the Army.<br />
This publication is approved for public release.<br />
Distribution unlimited.<br />
PIN: 085736-000